This resource is no longer available
There was once a time when many computer professionals relied solely on one technology for protecting their computers and networks. But today, most well-developed organizations use a collection of several technologies, methodologies and products, each to protect against a particular threat. The concept of a layered protection strategy – or “defense in depth” – is fairly well known, but many IT professionals are overlooking what can be one of the strongest layers of defense available – application whitelisting.
No single technology guarantees security, but application whitelisting covers situations not addressed by firewalls or anti-virus utilities. This webcast focuses on:
- How application whitelisting is effectively used as an important layer in a security scenario
- How whitelisting compliments, enhances and augments existing defenses
- Limitations and difficulties inherent in various existing defenses