Application whitelisting: The white knight

Share this article:
Application whitelisting: The white knight
Application whitelisting: The white knight
While whitelisting technology, the process of defining which applications can run on a client machine, has been around for 10 years, lately it has gained new buzz. It has become abundantly clear that anti-virus companies are lagging in the struggle to keep up with the rise in malware, a problem that experts say will elevate application whitelisting technology from just a good idea to a mainstream, widely deployed security defense. This ebook from SC Magazine examines the topic, picking the brains of a number of experts in the field to assess the latest developments as technology advances have seen numerous whitelisting tools become available today that have made the solution more flexible and workable for the mainstream desktop environment.
Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Research

Sign up to our newsletters

POLL

More in Research

2014 audit and compliance ebook

2014 audit and compliance ebook

We explore the landscape today with which security teams must contend and compile a number of best practices and strategies you can apply to protect your company.

2014 eBook on Encryption

2014 eBook on Encryption

The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.