Desktop Software Lockdown: Prevent Targeted Attacks
07 April 2010
Download Type: Adobe PDF
Preventing the installation and execution of unauthorized software should be a high priority for any IT security conscious organization. Allowing users to install or execute unauthorized software can expose an organization to a variety of security and legal risks, not to mention the burden of increased support costs. This paper will compare and contrast a variety of techniques for detecting and preventing unauthorized code.
2010 launched with an explosion in media coverage of the IE zero-day attacks that targeted dozens of technology companies. Aurora, Hydra, Zeus, Advanced Persistent Threat – the names are new, but the approach is not.
Advanced, zero-day attacks have been around for years. So how does your company protect against these evolving, well-funded threats that continue to outsmart existing defenses?
According to Gartner, Application Whitelisting should be considered “foundational in our strategy to protect endpoints.” This proactive approach ensures only approved software is allowed to run, rendering new and unknown malware useless.
If you are responsible for protecting your company’s endpoints, download this Microsoft MVP-authored whitepaper, “Comparing Approaches for Desktop Software Lockdown.”
Already registered? Click the button below to login.