Desktop Software Lockdown: Prevent Targeted Attacks

07 April 2010
Download Type: Adobe PDF

Preventing the installation and execution of unauthorized software should be a high priority for any IT security conscious organization. Allowing users to install or execute unauthorized software can expose an organization to a variety of security and legal risks, not to mention the burden of increased support costs. This paper will compare and contrast a variety of techniques for detecting and preventing unauthorized code.

2010 launched with an explosion in media coverage of the IE zero-day attacks that targeted dozens of technology companies. Aurora, Hydra, Zeus, Advanced Persistent Threat – the names are new, but the approach is not.

Advanced, zero-day attacks have been around for years. So how does your company protect against these evolving, well-funded threats that continue to outsmart existing defenses?

According to Gartner, Application Whitelisting should be considered “foundational in our strategy to protect endpoints.” This proactive approach ensures only approved software is allowed to run, rendering new and unknown malware useless.

If you are responsible for protecting your company’s endpoints, download this Microsoft MVP-authored whitepaper, “Comparing Approaches for Desktop Software Lockdown.”


We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×