« ALEA Home | Email msg. | Reply to msg. | Post new | Board info. Previous | Home | Next

Request For Information

By: Cactus Flower in ALEA | Recommend this post (0)
Sat, 09 Mar 13 7:34 PM | 80 view(s)
Boardmark this board | The Trust Matrix
Msg. 12813 of 54959
Jump:
Jump to board:
Jump to msg. #

Well, this is interesting and - if the different responses are published - will make it clear if Wave is a player.

I wonder if this is the kind of deal where either McIntel or MS pops up and says they have the solution. And it begins with software and perhaps evolves towards hardware.

I'm still not clear that Wave has a solution that operates across all types of equipment. Indeed, I think it does not.

"DISA issues RFI for trusted endpoint operations
By Defense Systems StaffMar 08, 2013

The Defense Information Systems Agency has issued a request for information for trusted endpoint operations (TEO) technology that can be integrated with Host Based Security System, according to a procurement notice.

DISA's Program Executive Office for Mission Assurance is seeking technology that can furnish enforcement of workflow that introduce changes to managed assets by configuration management and application sandboxing, stated the March 6 announcement on the FedBizOpps website. The capability should flag, defend against, and react to anomalous and unauthorized configurations, the notice said.

The TEO capability should prohibit application and operating system level configuration changes, protect key and high-risk registries and objects, protect integrity of process memory allocations and furnish protection against operating system tampering, the notice said. The capability should detect and provide alerts to event correlation tools by providing actionable intelligence to inform a response.

The TEO capability is expected to be standardized and deployed within the DOD on an enterprise-wide basis or on isolated network enclaves (tactical environments), to strengthen extant DOD endpoint capabilities to protect, detect, diagnose and react to malware and other cyber threats."

http://defensesystems.com/articles/2013/03/08/disa-rfi-trusted-endpoint-operations.aspx


- - - - -
View Replies (1) »



» You can also:
« ALEA Home | Email msg. | Reply to msg. | Post new | Board info. Previous | Home | Next