Cloud backup & recovery

Application whitelisting News

Application whitelisting Get Started

Bring yourself up to speed with our introductory content

Evaluate Application whitelisting Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Manage Application whitelisting

Learn to apply best practices and optimize your operations.

  • How can you whitelist apps and fight ransomware with Windows 10 AppLocker?

    With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading

  • How is Windows AppLocker whitelisting bypassed by Regsvr32?

    Windows AppLocker whitelisting was discovered to be exploitable with command-line tool Regsvr32. Expert Nick Lewis explains how organizations can mitigate possible attacks. Continue Reading

  • Endpoint protection: Using whitelisting as a tactic

    Many security technologies have been developed to help organizations secure application use on endpoints, yet few have achieved their goal.

    When application control first became important to the market, it seemed endpoint application security woes would be answered. However, the traditional blacklisting approach quickly proved inefficient, which brought a new method -- application whitelisting -- to light. Yet even this highly beneficial technology has been riddled with complexity.

    In this Technical Guide, Mike Chapple outlines the evolution of whitelisting technologies and offers best practices to improve your application control deployment. Then, Ernie Hayden reviews the key points of the NIST cybersecurity framework, explaining how the document helps critical infrastructure organizations improve their security programs. And Ajay Kumar wraps up, discussing how application whitelisting can prevent malware infections and offering tips for overcoming the challenges whitelisting tools present.

    Application whitelisting can be invaluable -- this cannot be denied. But is it worth the extra time and effort required to put it into practice and manage it? This Technical Guide offers the insight your organization needs to decide whether application whitelisting can fulfill your application control needs to help you conquer your company's endpoint application security challenges, or if another method would be more applicable. Continue Reading

View All Manage

Problem Solve Application whitelisting Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve