Security Automation Connects Silos

A wealth of security information exists in our networks from a variety of sources – policy servers, firewalls, switches, networking infrastructure, defensive components, and more. Unfortunately, most of that information is locked away in separate silos due to differences in products and technologies, as well as by companies’ organizational boundaries. Further complicating the issue, information is stored in different formats and communicated over different protocols.
An open standard from the Trusted Computing Group (TCG) offers the capability to centralize communication and coordination of information to enable security automation. The Interface for Metadata Access Points – IF-MAP for short – is like Facebook for network and security technology, allowing real-time sharing of information across a heterogeneous environment.

read more