Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

eBook from Lumension examines the evolution of Whitelisting

Lumension Security : 12 February, 2010  (New Product)
Endpoint security modelling is seen by Lumension as the correct approach to managing IT security as illustrated in the Evolution in Application Whitelisting eBook recently published by the company
Shift happens. The threat landscape has changed for the worse as evidenced by the recent highly publicised attacks by hackers who used sophisticated methods to steal core intellectual property from Google, Adobe, and other high profile companies. Cyber criminals have become more agile than ever, insiders have increasingly taken advantage of trust and new Web 2.0 technologies have given both parties open access to sensitive data stores. Traditional technologies such as antivirus and firewalls can no longer act as the mainstay of modern security programs. The year 2009 was believed to be the tipping point of a cybercrime epidemic in which more malware was identified than any other time in the history of computing. With current growth rates of malware, it is feasible to see billions if not trillions of malware signatures within the span of a few short years. Organisations must begin to shift from a threat centric approach where the focus is on stopping what is known to be bad, to a trust centric model where the focus is on protecting what is known to be good and trusted in order to achieve greater intelligence around endpoint risks. In doing so, organisations will better eliminate risk, reduce complexity, lower TCO and improve overall endpoint security and compliance posture.

Lumension, experts in endpoint management and security, has unveiled a new eBook titled, "Shift Happens: The Evolution in Application Whitelisting." The eBook is designed to arm security professionals with a better understanding of the new endpoint security risks to confidential data and proprietary systems and why organisations must make a shift away from traditional approaches to endpoint security models and look to adopt a trust centric model with application whitelisting.

"Whitelisting may be perceived as a new novel idea, but the old oak trees of IT security will tell you that it is hardly a new approach to shoring up systems," Paul Zimski, vice president of solution marketing, Lumension. "The shift in the threat landscape, sophistication of hackers, and growing insider risks to intellectual property and proprietary systems is forcing organisations to re-evaluate and assess the effectiveness of their current IT security strategy and to look at the key benefits of application whitelisting. The latest generation of application whitelisting technology offers a quantum leap of protection and reduced operational costs without stifling productivity and, it's easy to implement."

The new eBook unveils how a fundamental shift in the threat landscape and the evolution in whitelisting technology enables organisations to benefit within static environments, but also reveals how current and future advances in the technology make whitelisting operationally feasible even within dynamic business environments.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo