Application Explosion: How to Manage Productivity and Security
sponsored by Lumension

This paper discusses the risks of uncontrolled applications, best practices for controlling those applications, and the array of choices available, exploring the attributes of Microsoft’s built-in tools, of free and open source software, and of third-party commercial application control systems. You'll learn how the difficulty of positively identifying applications complicates the application control process, and why application whitelists, rather than blacklists, are the only effective way to achieve control. You’ll also see how application control is enhanced when integrated within an overall endpoint control system.

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from Lumension
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement