Search Content
find
CATALOG
Data Infrastructure
Data Tools
Desktops, Laptops and OS
Enterprise Applications
IT Infrastructure
IT Management
Networking and Communications
Security
Servers and Server OS
Software and Web Development
Storage
Dashboard
News
My ITmodelbook
Messages
Events (0)
CONNECTIONS
more
Connect
with other members or
invite
your contacts to the community.
+ invite connections
GROUPS
more
Join
an existing group to participate in the group discussions or
create
a new group of your own to create discussions around topics of interest to you and your work.
+ create group
MY RESOURCES
more
Find
info or
add
new info to your ITmodelbook. You can find white papers, technology reports, business analysis, webinars, presentations and more. You can also share your own authored content and resources you like by adding this info.
+ add resource
Online Users=0
Resources you may like
Understanding Application Whitelisting
Share within ITmb
Share This Resource
Share with: Connections
or
Share with: Groups
Blacklisting undesirable applications still has its uses. However, with today's more dynamic computing environments, rapidly evolving threat landscape, and rigorous compliance mandates, blacklisting has reached its limits. Its heavy signature requirements make it unwieldy, the need for systems to regularly call home for signature updates make it inconvenient. Not to mention, it's also reactive: Blacklisting requires having advanced knowledge of the application (signature) and an unbeatable sensory method for reading signs of malicious activity.
Because of these inconveniences, application whitelisting (allowing only approved applications to run and blocking all others) is making its way into IT organizations to achieve compliance and protect systems from malicious applications executing on them.
This white paper defines why application whitelisting is important, differentiates the two approaches to application control (whitelist vs. blacklist), and discusses where the adoption of application whitelisting is most applicable. It discusses the applicability of application whitelisting on dedicated systems and in enterprise cases, while examining compliance implications and offering best practices.
Written by: SANS Institute
Sponsored by: McAfee
Level
Select Level
Subject Area
Select Subject Area
Keywords
Understanding Application Whitelisting, McAfee , McAfee Complimentary White Paper, Written by SANS Institute, SANS Institute, Blacklisting undesirable applications, whitelist vs. blacklist, IT organizations, dedicated systems, malicious activity,
Offered by
Understanding Application Whitelisting
URL
Files
The resource is available from the link above.
Bookmark to
My ITmodelbook
add
Group ITmodelbooks
Latest reports from top IT companies:
SAP
HP
Janrain
HubSpot
PrepLogic
Motorola
BNP Media
Informatica
Microsoft
Jobvite
© ITmodelbook 2012-2025.
sitemap
about
privacy
terms
help
do not sell my personal information