Enforcement - A New Metaphor?
So we were talking about Trusted Network Technology's offering in the context of really being the enforcer. It is a level 2 device that looks at packet data as they flow across the network and permits or denies access to resources if the policies permit it. Here is the interesting rub - the solution enforces - it does not set policy, or manage. The kicker in the value of this is go ahead and deploy your Identity Management applications, it's a great thing to do, however just like Congress or State legislatures, the policies would be useless without the cops.
Pretty cool stuff.