sponsored by Faronics
Premiered:  Nov 19, 2009
Format:  Multimedia
Type:  Webcast
Language:  English
ABSTRACT:

There was once a time when many computer professionals relied solely on one technology for protecting their computers and networks. But today, most well-developed organizations use a collection of several technologies, methodologies and products, each to protect against a particular threat. The concept of a layered protection strategy – or “defense in depth” – is fairly well known, but many IT professionals are overlooking what can be one of the strongest layers of defense available – application whitelisting.

No single technology guarantees security, but application whitelisting covers situations not addressed by firewalls or anti-virus utilities. This webcast focuses on:

  • How application whitelisting is effectively used as an important layer in a security scenario
  • How whitelisting compliments, enhances and augments existing defenses
  • Limitations and difficulties inherent in various existing defenses




Speaker

Byron Hynes
CISSP
Byron Hynes is an infrastructure and security specialist with over 25 years in IT and related fields. He has a proven track record in managing cross-group projects and initiatives and sound communication skills, as a technical writer, conference speaker and trainer. Byron has worked with small startups, non-profits, mid-size companies and the largest enterprises, including Microsoft, where Byron helped to create Windows Server 2008, working on features like BitLocker and Authorization Manager.



BROWSE RELATED WEBCASTS
Application Security | Cybersecurity | Firewall Appliances | Security | Security Best Practices | Security Threats | Virus Protection

View All Resources sponsored by Faronics

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement