| |||||
| |||||
Search Irongeek.com: ![]() ![]()
Help Irongeek.com pay for bandwidth and research equipment: |
Application whitelisting has been touted as the definitive
solution to many of the shortcomings of signature based
malware solutions. While this may be true- introducing the
technology to any environment without careful planning and
foresight can prove disastrous. Evaluate the gaps between
vendor marketing materials and real-world application white-
listing experiences and research to provide an overview of
the technology. Implementation guidance covering potential
technical and non-technical land mines- key success factors
and operational considerations will provide decision materials
necessary to determine if this silver bullet belongs in the
arsenal.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast