Developing Best Practices to Application Whitelisting: An In-Depth Technical Webcast

The evolving state of the endpoint: How will you cope?
The evolving state of the endpoint: How will you cope?

Developing Best Practices to Application Whitelisting: An In-Depth Technical Webcast

Date: Wednesday, May 16th
Time: 11:00 a.m. PT / 2:00 p.m. ET
Register: HERE

As IT professionals know, endpoint security needs are evolving: new vulnerabilities are disclosed every day, new malware creation is exploding, and traditional AV signatures cannot keep up.  You know that patch management and AV are necessary – but not sufficient – layers of endpoint defense. Intelligent application whitelisting is an important addition to your risk mitigation strategy, and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.

Join this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address:

  • Prepare – properly laying the groundwork for implementing application whitelisting is crucial to ultimate success.
  • Lockdown – preventing unwanted or dangerous changes while providing necessary flexibility to support business needs.
  • Manage – maintaining the environment as application, end user and business needs develop.

Featured Speakers

Chris Merritt, director of solution marketing, Lumension
David Murray, senior product manager, Lumension
Douglas Walls, CIO, EMSolutions, Inc.

Sponsored by:

 

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...