On Mon, Jan 30, 2012 at 15:49, Ben Scott <[email protected]> wrote: > On Mon, Jan 30, 2012 at 5:46 PM, Stu Sjouwerman > <[email protected]> wrote: >> So, what is the big news? It turns security on its head. Instead of >> keeping bad code out, with application whitelisting (also known as >> Application Control) you only allow known-good code to run. That's >> really a 180, and very, very interesting from a system admin perspective. > > The way I see it, this is not new. Don't let untrusted code run. > It's been a best practice for decades. In large organizations with > poor security, this has historically been a challenge, since they have > no control over what they run. These "whitelisting" tools help manage > and correct for that situation. But if you have had strong software > controls to begin with, it's kind of like... "Duh."
Well, yes, the PC ruined the security of the mainframe/mini, and now the PDA/Smartphone/Tablet is ruining the security of the PC. And so it goes - but the cycle is getting tighter - there are are now whitelisting apps for the PDA/Smartphone/Tablet as well as the PC. I'm sure application whitelisting will come right along with the new brain implants that are right around the corner... Kurt ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
