Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Bit9 > Realistic Security, Realistically Deployed: Today’s Application Control and Whitelisting
 

Realistic Security, Realistically Deployed: Today’s Application Control and Whitelisting

White Paper Published By: Bit9
Bit9
Published:  Mar 07, 2013
Type:  White Paper
Length:  9 pages

Historically, IT defense has focused largely on the threat. So-called “blacklist” technologies maintain an inventory of specific attack types, and provide defense against each. Today, the volume, variety and sophistication of attacks highlights the limitations of such approaches, as signature databases approach their upper limits and leave exploitable gaps in defense.

These changes in the threat landscape have led many organizations to consider the alternative to a blacklist approach. In contrast to blacklisting that identifies and blocks known threats, application control technologies such as whitelisting focus on recognizing legitimate functionality, and monitoring, containing or preventing all else. Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies. 




Tags : 
whitelisting, security, application control, cyber attacks, blacklist