sponsored by Faronics
Posted:  07 Jan 2010
Published:  07 Jan 2010
Format:  PDF
Length:  17  Page(s)
Type:  Presentation Transcript
Language:  English

There was once a time when many computer professionals relied solely on one technology for protecting their computers and networks. But today, most well-developed organizations use a collection of several technologies, methodologies and products, each to protect against a particular threat. The concept of a layered protection strategy – or "defense in depth" – is fairly well known, but many IT professionals are overlooking what can be one of the strongest layers of defense available – application whitelisting.

No single technology guarantees security, but application whitelisting covers situations not addressed by firewalls or anti-virus utilities. This Presentation Transcript focuses on:

  • How application whitelisting is effectively used as an important layer in a security scenario
  • How whitelisting complements, enhances and augments existing defenses
  • Limitations and difficulties inherent in various existing defenses

Application Security | Cybersecurity | Firewall Appliances | Security | Security Best Practices | Security Industry | Security Threats | Virus Protection

View All Resources sponsored by Faronics

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement