application whitelisting

Results 1 - 10 of 10Sort Results By: Published Date | Title | Company Name

The Evolving Landscape of Desktop Security

Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting, application control, antivirus, application whitelisting, global threat intelligence, dynamic whitelisting, anti spam, anti spyware, anti virus, application security, auditing, compliance, hacker detection
    
McAfee

Understand the Four Phases of A Cyber Attack

Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee

Reducing Local Admin Exposure Through Application Whitelisting

Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, access control, anti spam
    
Lumension

Developing Best Practices to Application Whitelisting: An In-Depth Technical Webcast

Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management, compliance, encryption, network security appliance, security management, vulnerability management
    
Lumension

Intelligent Whitelisting: An Introduction to More Effective and Efficient Endpoint Security

Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management, database development, database security
    
Lumension

Intelligent Whitelisting: An Introduction to More Effective and Efficient Endpoint Security

Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management, database development, database security
    
Lumension

Endpoint Security: Winning the Endgame

Published By: Lumension     Published Date: Apr 15, 2011
Learn how to effectively secure endpoints with a defense-in-depth approach that includes patch management, anti-virus, application whitelisting and device control.
Tags : 
malware, endpoint security, anti-virus, data protection, cyberthreat, anti spam, anti virus, application security, network security appliance
    
Lumension

Realistic Security, Realistically Deployed: Today’s Application Control and Whitelisting

Published By: Bit9     Published Date: Mar 07, 2013
Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies.
Tags : 
whitelisting, security, application control, cyber attacks, blacklist, business activity monitoring
    
Bit9

Intelligent Whitelisting: An Introduction to More Effective and Efficient Endpoint Security

Published By: Lumension     Published Date: Mar 29, 2011
Download this Lumension white paper from Web Buyer's Guide to learn more about a new intelligent approach to application whitelisting.
Tags : 
lumension, whitelisting, business intelligence, deployment, malware, automated patch management, security, anti spam, anti spyware, anti virus, patch management, security management, business process automation
    
Lumension
Search      

Add Research

Get your company's research in the hands of targeted business professionals.