All
All

Guide to Application Whitelisting

673 MB | 3 files | null PDF

This publication is intended to assist organizations in understanding the basics of application whitelisting, as well as the planning and implementation for whitelisting technologies throughout the security deployment lifecycle.

IT Download image

An application whitelist is a list of applications and application components (libraries, configuration files, etc.) that are authorized for use in an organization. Application whitelisting technologies use whitelists to control which applications are permitted to execute on a host. This helps to stop the execution of malware, unlicensed software, and other unauthorized software.

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • NIST.SP.800-167.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ...  More >>

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ...  More >>

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.