Webinars - Featured Articles
Application Control and Whitelisting Solutions Provide Security Transparency
Today, Internet and social media applications are a common source of vulnerabilities on a network. Now, IT professionals are faced with the challenge of controlling multiple Web applications without hindering productivity.
Businesses must understand and control every single application that employees use because application visibility is critical to the health of your network and your business. Application control gives the administrator real-time and historical visibility into the use of applications on the network.
These days, application control technologies such as “whitelisting” have been valuable in blocking malicious attacks from making changes to systems, stealing credentials and damaging access to sensitive information. Application whitelisting is a computer administration practice used to prevent unauthorized programs from running. The primary purpose of whitelisting is to protect computers and networks from harmful applications as well as prevent unnecessary demand for resources.
The whitelist is a list of applications that have been given permission by the administrator. For instance, when an application tries to execute it is then automatically checked against the list and, if found, permitted to run. Also, an integrity check, such as hashing, is typically added to ensure that the application is the authorized program and not a malicious one with the same name.
But, many think proactive application controls like whitelisting are unrealistic or disruptive. So, then there is the question of what defines “realistic”?
Verizon’s (News - Alert) 2012 Data Breach Investigations Report Disruptive reported antivirus, network defense and other “blacklist”-oriented defenses are supposed to recognize and block attacks. The number of breaches in which malware was a factor increased from 26 percent between 2004 and 2007 to 69 percent in 2011, when it was implicated in 99 percent of records breached. “Hacking” was implicated in 51 percent of successful breaches between 2004 and 2007, and in 2011, it was a factor in 81 percent.
So, it appears that it is time to make some changes in application control.
Join EMA (News - Alert) Managing Research Director, Scott Crawford, and Bit9 Director of Product Marketing, Ian Lee in a webinar entitled, “Today’s Application Control and Whitelisting: Realistic Security, Realistically Deployed” on Tuesday, Nov. 13 at 2pm EST. In this webinar, attendees will learn how application control and whitelisting solutions help organizations deal with demanding threats and how today’s innovative technologies make security more transparent and adaptable to business requirements.
Edited by Rachel Ramsey
Related Webinar Articles
- Scale-Out Cloud Storage is Becoming a Popular Value-Added Offering for MSPs
- Are You Using Key Performance Indicators of the Past in a Next-Gen Contact Center?
- Leveraging Speech in the Call Center to Create Customer Delight
- Uncovering the Roadblocks to First-Call Resolution
- Red Hat Provides Use Cases for Open Source Cloud Storage