Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Malware blocking through endpoint application control

PGP (GB) : 20 May, 2009  (New Product)
Automatic zero day threat protection with PGP’s Endpoint Application Control product
To help organisations combat the rising threats of malware and unauthorised software entering corporate networks, PGP Corporation, a global leader in enterprise data protection, has announced PGP Endpoint Application Control, the latest addition to the PGP Endpoint family of solutions. PGP Endpoint Application Control blocks malicious and unauthorised software, including applications, scripts and macros, from executing on a user’s system by automatically enforcing policies using whitelisting technology that explicitly allows only trusted and authorised software applications. PGP customers can now have zero-day, automatic threat protection against known and unknown application and software threats.

New malware threats are emerging daily, compromising user privacy, causing business disruption and affecting the ability to demonstrate compliance. While some organisations may think they are protected against malware intrusions with anti-virus solutions, anti-virus solutions do not necessarily provide a sufficient layer of protection. In fact, according to AV Comparatives, most anti-virus solutions missed over 50 new application threats introduced in 2008. Take the example of the massive data breach attack on Heartland Payment Systems announced earlier this year, where over 100 million credit card numbers were compromised for fraudulent transactions. The source of the attack was malicious software that was planted on the company's payment processing network that sniffed payment card data as it was being sent for processing to Heartland by thousands of the company's retail clients.

PGP Endpoint Application Control builds on PGP Corporation’s reputation for delivering award-winning products that provide a proactive approach to data protection with multiple layers of security to safeguard organisations against the risk and ramifications of compromised data and intellectual property. Additionally, as business application requirements change and new threats are introduced, IT administrators can easily update existing whitelisting policies that are transparent to the end-user.

“Today’s business environment is wireless and borderless between customers, partners, consultants, mobile employees and shared computers, making confidential information at risk everywhere,” said Phillip Dunkelberger, president and CEO of PGP Corporation. “PGP Corporation has always advocated to customers that they build an enterprise-wide data protection strategy from the endpoint all the way to the mainframe. With PGP Endpoint Application Control, we are continuing to strengthen our data protection solutions with another layer of control to help ensure business continuity for our customers.”

By making use of PGP Endpoint Application Control as another layer of data defence, customers can ensure business continuity with always-on protection and not have to worry about malicious software entering their networks. Furthermore, the ability to demonstrate compliance is easily achieved with PGP Endpoint Application Control’s capability to audit all application execution attempts and policy changes.

Together, PGP Endpoint Application Control and PGP Endpoint Device Control provide comprehensive, granular, and policy-based enforcement of unauthorised software, malware, devices and removable media – delivering complete protection against data leakage, loss or theft.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo