Search Content
Connect with other members or invite your contacts to the community.
Join an existing group to participate in the group discussions or create a new group of your own to create discussions around topics of interest to you and your work.
Find info or add new info to your ITmodelbook. You can find white papers, technology reports, business analysis, webinars, presentations and more. You can also share your own authored content and resources you like by adding this info.
Resources you may like
  • Share within ITmb

Blacklisting undesirable applications still has its uses. However, with today's more dynamic computing environments, rapidly evolving threat landscape, and rigorous compliance mandates, blacklisting has reached its limits. Its heavy signature requirements make it unwieldy, the need for systems to regularly call home for signature updates make it inconvenient. Not to mention, it's also reactive: Blacklisting requires having advanced knowledge of the application (signature) and an unbeatable sensory method for reading signs of malicious activity.

Because of these inconveniences, application whitelisting (allowing only approved applications to run and blocking all others) is making its way into IT organizations to achieve compliance and protect systems from malicious applications executing on them.

This white paper defines why application whitelisting is important, differentiates the two approaches to application control (whitelist vs. blacklist), and discusses where the adoption of application whitelisting is most applicable. It discusses the applicability of application whitelisting on dedicated systems and in enterprise cases, while examining compliance implications and offering best practices.

Written by: SANS Institute

Sponsored by: McAfee

Understanding Application Whitelisting, McAfee , McAfee Complimentary White Paper, Written by SANS Institute, SANS Institute, Blacklisting undesirable applications, whitelist vs. blacklist, IT organizations, dedicated systems, malicious activity,
Offered by
Understanding Application Whitelisting
The resource is available from the link above.
Ask a question
search Paper Image Add papers image
Bookmark to
My ITmodelbook add
Group ITmodelbooks
'Artisteer - Web Design Generator'

Latest reports from top IT companies:

SAP HP Janrain HubSpot PrepLogic Motorola BNP Media Informatica Microsoft Jobvite