This resource is no longer available
Application Explosion: How to Manage Productivity and Security
This paper discusses the risks of uncontrolled applications, best practices for controlling those applications, and the array of choices available, exploring the attributes of Microsoft’s built-in tools, of free and open source software, and of third-party commercial application control systems. You'll learn how the difficulty of positively identifying applications complicates the application control process, and why application whitelists, rather than blacklists, are the only effective way to achieve control. You’ll also see how application control is enhanced when integrated within an overall endpoint control system.