Inside the NSA trusted computing strategy

Inside the NSA trusted computing strategy

Date: Oct 04, 2011

It may not be obvious, but the National Security Agency has the same computing needs and worries most enterprises do.

“We’re trying to solve the same kinds of problems the marketplace is trying to solve,” said Tony W. Sager, chief operating officer of the Information Assurance Directorate of the NSA. “We want clouds, we want the latest tablets, the latest smartphones … so our people have more power, more access to information and more opportunities to succeed in the same way everyone else does.”

In this interview from the second annual NSA Trusted Computing Conference in Orlando, Sager discusses why the concepts of trusted computing are of foremost importance to the NSA and how they’re being put to work to solve the network and endpoint integrity problems faced by the public and private sector alike. Sager also explains why enterprise security efforts “don’t have a prayer” without greater visibility into enterprise environments, and the importance of understanding the economics of disrupting attackers.

More on Client security

  • canderson

    Rise in mobile device platforms increases need for mobile data security

    VIDEO - Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security.
  • canderson

    Malware detection and prevention fundamentals

    VIDEO - Learn about the state of the malware landscape as it pertains to small and medium sized businesses and get a rundown on the most common types of malware.
  • canderson

    Revitalizing endpoint security with VDI desktops

    VIDEO - Implementing VDI desktops provides an opportunity to re-architech endpoint security and management. Learn how in this supercast with Eric Ogren.
  • SmartScreen

    Definition - SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7's Internet Explorer 8, SmartScreen uses a whitelist of trusted sites collected from the surfing data of other IE SmartScreen users.
  • Mobile security market moves away from FUD

    News - Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.

    ( Jul 02, 2014 )

  • Karen Scarfone, Contributor

    Karen Scarfone, Contributor

    Contributor - Karen Scarfone, principal consultant at Scarfone Cybersecurity, provides consulting services and has coauthored more than 50 NIST Special Publications and Interagency reports in the past decade. Read her advice here on SearchSecurity.
  • Sandboxing security: A cure-all strategy for virtual environments?

    Answer - Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments.
  • Experts: Merely ousting Bennett won't solve Symantec strategy problems

    News - Experts say firing Steve Bennett overshadows the larger problems with the Symantec strategy, namely the company's lack of focus on security.

    ( Mar 21, 2014 )

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: