On Mon, Jan 30, 2012 at 15:49, Ben Scott <[email protected]> wrote:
> On Mon, Jan 30, 2012 at 5:46 PM, Stu Sjouwerman
> <[email protected]> wrote:
>> So, what is the big news? It turns security on its head. Instead of
>> keeping bad code out, with application whitelisting (also known as
>> Application Control) you only allow known-good code to run. That's
>> really a 180, and very, very interesting from a system admin perspective.
>
>  The way I see it, this is not new.  Don't let untrusted code run.
> It's been a best practice for decades.  In large organizations with
> poor security, this has historically been a challenge, since they have
> no control over what they run.  These "whitelisting" tools help manage
> and correct for that situation.  But if you have had strong software
> controls to begin with, it's kind of like... "Duh."

Well, yes, the PC ruined the security of the mainframe/mini, and now
the PDA/Smartphone/Tablet is ruining the security of the PC.

And so it goes - but the cycle is getting tighter - there are are now
whitelisting apps for the PDA/Smartphone/Tablet as well as the PC.

I'm sure application whitelisting will come right along with the new
brain implants that are right around the corner...

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to