What exactly is meant that eTrust Access Control provides proactive security?
Most security solutions tend to provide methods that are reactive in nature. The history of computer security has proven these reactionary methods to be only temporary fixes, since the methods address the security symptoms at the application level. The design of eTrust Access Control addresses security events at the system and system call level. This approach is taken since all resource access requests (application or other) are handled by the system and must go through the kernel.