PRO+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
November 2014

Endpoint protection: Using whitelisting as a tactic

Sponsored by

Many security technologies have been developed to help organizations secure application use on endpoints, yet few have achieved their goal.

When application control first became important to the market, it seemed endpoint application security woes would be answered. However, the traditional blacklisting approach quickly proved inefficient, which brought a new method -- application whitelisting -- to light. Yet even this highly beneficial technology has been riddled with complexity.

In this Technical Guide, Mike Chapple outlines the evolution of whitelisting technologies and offers best practices to improve your application control deployment. Then, Ernie Hayden reviews the key points of the NIST cybersecurity framework, explaining how the document helps critical infrastructure organizations improve their security programs. And Ajay Kumar wraps up, discussing how application whitelisting can prevent malware infections and offering tips for overcoming the challenges whitelisting tools present.

Application whitelisting can be invaluable -- this cannot be denied. But is it worth the extra time and effort required to put it into practice and manage it? This Technical Guide offers the insight your organization needs to decide whether application whitelisting can fulfill your application control needs to help you conquer your company's endpoint application security challenges, or if another method would be more applicable.

About The Author

Mike Chapple - Senior Director of IT Service Delivery

Mike Chapple, Ph. D., CISA, CISSP, is a senior director of IT ...Read More

Table Of Contents

  • Improve your application control with whitelisting
  • The NIST cybersecurity framework is here: Now what?
  • Whitelisting: Filtering for advanced malware prevention

More PRO+ Content

View All