application whitelisting

Results 1 - 10 of 10Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension
Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch
    
Lumension
Published By: Bit9     Published Date: Mar 07, 2013
Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies.
Tags : 
whitelisting, security, application control, cyber attacks, blacklist
    
Bit9
Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting
    
McAfee
Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: Lumension     Published Date: Apr 15, 2011
Learn how to effectively secure endpoints with a defense-in-depth approach that includes patch management, anti-virus, application whitelisting and device control.
Tags : 
malware, endpoint security, anti-virus, data protection, cyberthreat
    
Lumension
Published By: Lumension     Published Date: Mar 29, 2011
Download this Lumension white paper from Web Buyer's Guide to learn more about a new intelligent approach to application whitelisting.
Tags : 
lumension, whitelisting, business intelligence, deployment, malware, automated patch management, security
    
Lumension
Search      

Add Research

Get your company's research in the hands of targeted business professionals.