Expert e-book: Best practices for implementing and managing whitelisting

Cover Image

Many security technologies have been developed to help organizations secure application use on endpoints, yet few have achieved their goal.   

When application control first became important to the market, it seemed endpoint application security woes would be answered. However, the traditional blacklisting approach quickly proved inefficient, which brought a new method—application whitelisting—to light. Yet even this highly beneficial technology has been riddled with complexity. 

In this Technical Guide, Mike Chapple outlines the evolution of whitelisting technologies and offers best practices to improve your application control deployment. Then, Ernie Hayden reviews the key points of the NIST cybersecurity framework, explaining how the document helps critical infrastructure organizations improve their security programs. And Ajay Kumar wraps up, discussing how application whitelisting can prevent malware infections and offering tips for overcoming the challenges whitelisting tools present.

Application whitelisting can be invaluable—this cannot be denied. But is it worth the extra time and effort required to put it into practice and manage it? This Technical Guide offers the insight your organization needs to decide whether application whitelisting can fulfill your application control needs to help you conquer your company's endpoint application security challenges, or if another method would be more applicable.  

Vendor:
TechTarget Security
Posted:
Feb 8, 2021
Published:
Nov 5, 2014
Format:
PDF
Type:
eBook
Already a Bitpipe member? Log in here

Download this eBook!