Access your Pro+ Content below.
Endpoint protection: Using whitelisting as a tactic
Sponsored by SearchSecurity.com
Many security technologies have been developed to help organizations secure application use on endpoints, yet few have achieved their goal.
When application control first became important to the market, it seemed endpoint application security woes would be answered. However, the traditional blacklisting approach quickly proved inefficient, which brought a new method -- application whitelisting -- to light. Yet even this highly beneficial technology has been riddled with complexity.
In this Technical Guide, Mike Chapple outlines the evolution of whitelisting technologies and offers best practices to improve your application control deployment. Then, Ernie Hayden reviews the key points of the NIST cybersecurity framework, explaining how the document helps critical infrastructure organizations improve their security programs. And Ajay Kumar wraps up, discussing how application whitelisting can prevent malware infections and offering tips for overcoming the challenges whitelisting tools present.
Application whitelisting can be invaluable -- this cannot be denied. But is it worth the extra time and effort required to put it into practice and manage it? This Technical Guide offers the insight your organization needs to decide whether application whitelisting can fulfill your application control needs to help you conquer your company's endpoint application security challenges, or if another method would be more applicable.
Table Of Contents
- Improve your application control with whitelisting
- The NIST cybersecurity framework is here: Now what?
- Whitelisting: Filtering for advanced malware prevention
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
More PRO+ ContentView All