Application whitelisting News
February 28, 2014
Plexxi's Michael Bushong says the Open Networking Summit 2014 should move beyond the SDN buzz and into the technical nitty-gritty.
April 20, 2011
Application white listing is one of the oldest forms of end point security; vendors are working on improving application control implementations by adding trust models and reducing the management overhead.
February 14, 2011
Lumension announced its an early adopter program for companies to try its Intelligent Whitelisting product for endpoint security.
Application whitelisting Get Started
Bring yourself up to speed with our introductory content
Allowing known good applications and data isn't enough for enterprises. Beth Musumeci explains why a hybrid whitelisting-blacklisting approach is the best option for security. Continue Reading
Windows AppLocker lets you use rules to whitelist or block applications based on attributes such as publisher or path, but it's not a comprehensive application control tool. Continue Reading
Endpoint devices are often the root cause of data breaches. Expert Eric Cole explains the best ways to improve endpoint protection. Continue Reading
Evaluate Application whitelisting Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A new Microsoft security feature takes aim at Windows 10 malware. Expert Michael Cobb explains what enterprises should know about Device Guard. Continue Reading
Citrix and other virtual desktop vendors now support User Installed Applications. IT can prevent UIA from running amuck using these strategies and application whitelisting tools. Continue Reading
Application whitelisting was hyped as an antivirus killer. Its real role is serving as an added weapon in the battle against malware. Continue Reading
Manage Application whitelisting
Learn to apply best practices and optimize your operations.
With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading
Windows AppLocker whitelisting was discovered to be exploitable with command-line tool Regsvr32. Expert Nick Lewis explains how organizations can mitigate possible attacks. Continue Reading
Many security technologies have been developed to help organizations secure application use on endpoints, yet few have achieved their goal.
When application control first became important to the market, it seemed endpoint application security woes would be answered. However, the traditional blacklisting approach quickly proved inefficient, which brought a new method -- application whitelisting -- to light. Yet even this highly beneficial technology has been riddled with complexity.
In this Technical Guide, Mike Chapple outlines the evolution of whitelisting technologies and offers best practices to improve your application control deployment. Then, Ernie Hayden reviews the key points of the NIST cybersecurity framework, explaining how the document helps critical infrastructure organizations improve their security programs. And Ajay Kumar wraps up, discussing how application whitelisting can prevent malware infections and offering tips for overcoming the challenges whitelisting tools present.
Application whitelisting can be invaluable -- this cannot be denied. But is it worth the extra time and effort required to put it into practice and manage it? This Technical Guide offers the insight your organization needs to decide whether application whitelisting can fulfill your application control needs to help you conquer your company's endpoint application security challenges, or if another method would be more applicable. Continue Reading
Problem Solve Application whitelisting Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Advanced malware can be tricky, but application whitelisting on desktops can provide an additional layer of protection against malware attacks. Continue Reading
Tom Chmielarski once tracked a worm infection down to a lab system oscilloscope that was running Windows. See why it was the perfect candidate for application whitelisting. Continue Reading
Although some may find Windows Vista's User Account Control feature annoying, it is really a variation of a security mechanism that is now re-emerging: the application whitelist. Michael Cobb explores application whitelist benefits and drawbacks, restriction options and best practices for organizations, and how the technology will factor into future security and antivirus products. Continue Reading