Matasano evaluated the SourceT architecture against three areas of vulnerability: code injection, privilege level escalation, and alteration or subversion of the trusted boot process
The boot process
verifies your Chrome OS install ensuring that it is not tampered with and thus free of viruses and other malware.
For the first time, users can logon with a combination of password, the Lenovo Fingerprint Reader or the RSA SecureID SID800 two-factor authentication token, before the system has completed the boot process
Boot from SAN capability enables LeftHand's Open iSCSI SAN customers to significantly reduce the total cost of IT ownership by maximizing consolidation of IT resources, minimizing equipment costs through the use of diskless servers, and simplifying management by centralizing the boot process
As a pioneer in the management of desktop and mobile systems, the DMTF has established the Desktop and Mobile Work Group to deliver additional concentration in this evolving area, extending the organization's Common Information Model (CIM) schema to enable the standardization of key functions, such as alerting and event logging, remote system power control and monitoring, boot process
monitoring, platform asset inventory, discovery and more.
DeepDefense also improves system performance by eradicating spyware that affects the boot process
and slows load times, as well as by significantly reducing the need for spyware scans.
2 specification will help ensure that malicious code cannot invade a device so early in its boot process
that steps cannot be taken to thwart the attack.
Compellent's Boot from SAN feature optimizes the boot process
by creating a golden copy of the boot image on the SAN rather than on the internal disk drives within every server - saving money, increasing performance and conserving capacity.
Stating that, "Zone Labs continues to enhance and strengthen existing features," PC Magazine notes that ZoneAlarm Security Suite includes many user-friendly improvements such as a user interface designed to thwart a malicious program's attempts to turn off protection, enhanced MailSafe to block suspicious e-mail attachments and a stealth firewall that loads earlier in the boot process
to seal off any window of opportunity a hacker may have to access an unprotected system.
Typically adding less than a second to the boot process
, System Commander automatically detects all OSes on a system and presents the user with available OS choices in a skinable graphics environment.