Inside the NSA trusted computing strategy

Inside the NSA trusted computing strategy

Inside the NSA trusted computing strategy

Date: Oct 04, 2011

It may not be obvious, but the National Security Agency has the same computing needs and worries most enterprises do.

“We’re trying to solve the same kinds of problems the marketplace is trying to solve,” said Tony W. Sager, chief operating officer of the Information Assurance Directorate of the NSA. “We want clouds, we want the latest tablets, the latest smartphones … so our people have more power, more access to information and more opportunities to succeed in the same way everyone else does.”

In this interview from the second annual NSA Trusted Computing Conference in Orlando, Sager discusses why the concepts of trusted computing are of foremost importance to the NSA and how they’re being put to work to solve the network and endpoint integrity problems faced by the public and private sector alike. Sager also explains why enterprise security efforts “don’t have a prayer” without greater visibility into enterprise environments, and the importance of understanding the economics of disrupting attackers.

More on Client security

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: