Historically, IT defense has focused largely on the threat. So-called “blacklist” technologies maintain an inventory of specific attack types, and provide defense against each. Today, the volume, variety and sophistication of attacks highlights the limitations of such approaches, as signature databases approach their upper limits and leave exploitable gaps in defense.
These changes in the threat landscape have led many organizations to consider the alternative to a blacklist approach. In contrast to blacklisting that identifies and blocks known threats, application control technologies such as whitelisting focus on recognizing legitimate functionality, and monitoring, containing or preventing all else. Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies.