Realistic Security, Realistically Deployed: Today’s Application Control and Whitelisting

By: Bit9

Historically, IT defense has focused largely on the threat. So-called “blacklist” technologies maintain an inventory of specific attack types, and provide defense against each. Today, the volume, variety and sophistication of attacks highlights the limitations of such approaches, as signature databases approach their upper limits and leave exploitable gaps in defense.

These changes in the threat landscape have led many organizations to consider the alternative to a blacklist approach. In contrast to blacklisting that identifies and blocks known threats, application control technologies such as whitelisting focus on recognizing legitimate functionality, and monitoring, containing or preventing all else. Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies. 

Tags : whitelisting, security, application control, cyber attacks, blacklist

* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Mar 07, 2013
Length:  9
Type:  White Paper