Automated mechanisms exist to implement remediation actions when integrity violations are discovered.
Automated mechanisms exist to implement remediation actions when integrity violations are discovered.
Automated mechanisms exist to verify the integrity of the boot process of information systems.
Automated mechanisms exist to protect the integrity of boot firmware in information systems.
Mechanisms exist to prohibit the use of binary or machine-executable code from sources with limited or no warranty and without access to source code.
Mechanisms exist to utilize Host-based Intrusion Detection / Prevention Systems (HIDS / HIPS) on sensitive systems.
Mechanisms exist to utilize anti-phishing and spam protection technologies to detect and take action on unsolicited messages transported by electronic mail.
Mechanisms exist to centrally-manage anti-phishing and spam protection technologies.
Mechanisms exist to automatically update anti-phishing and spam protection technologies when new releases are available in accordance with configuration and change management practices.
Mechanisms exist to establish a trusted communications path between the user and the security functions of the operating system.
Mechanisms exist to address mobile code / operating system-independent applications.