{"id":2157,"date":"2006-10-13T00:00:00","date_gmt":"2006-10-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/13\/a-listing-your-apps\/"},"modified":"2021-12-30T11:40:48","modified_gmt":"2021-12-30T11:40:48","slug":"a-listing-your-apps","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/13\/a-listing-your-apps\/","title":{"rendered":"A-Listing Your Apps"},"content":{"rendered":"<p>Whitelisting is getting a second look by some enterprises worried that unknown threats might get past antivirus and other blacklisting systems.  Whitelisting, the process of spelling out exactly which applications can run on a client machine, traces its roots to the mainframe and is typically considered overkill in today&#8217;s networks, as well as a potential management headache.  But the rise in zero-day attacks and paranoia about users running whatever they want on their machines (think peer-to-peer apps), or introducing malware via USB sticks, has led some organizations to think retro.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;It&#8217;s back to the future with some of this,&#8221; says Andrew Jaquith, program manager for security research at the Yankee Group.  Jaquith says the current approach of identifying and blocking the bad is starting to fail, with malware samples increasing at a rate of around 50 percent annually.  &#8220;Whitelisting is increasingly becoming part of a well-balanced diet on the client,&#8221; he says.<\/p>\n<p>And it&#8217;s quietly and slowly catching on beyond vendors such as SecureWave, Savant Protection, and Bit9 that have made a business out of whitelisting applications.  <\/p>\n<p>Many of the early whitelisting adopters today are small- to medium-sized organizations, where deploying this technology across desktops wouldn&#8217;t be as major an undertaking at say, a major Fortune 100 company.  SourceMedia has been testing Savant Protection&#8217;s endpoint software with whitelisting for several months.  &#8220;Conceptually, it makes a ton of sense,&#8221; says Ivan Latanision, vice president of information technology for SourceMedia, who adds the company hasn&#8217;t made its final decision on whether to purchase the tool yet.<\/p>\n<p>Savant uses unique cryptographic algorithms and signature keys for each application on each desktop, rather than a server-based access control list.  Patton Harris Rust &#038; Associates has been running SecureWave&#8217;s Sanctuary software for whitelisting since last year &#8212; initially for device control and later for application control as well.  John Loyd, vice president and director of IT for PHR&#038;A, says the company installed the software for protection against zero-day attacks, ensuring its users aren&#8217;t installing illegal software, and to ensure the quality of apps its engineers use.  Dennis Szerszen, vice president of marketing and corporate strategy of SecureWave, says antivirus blacklisting and Sanctuary&#8217;s whitelisting work best together.  &#8220;We need to be triggering the AV processes so they can clean up what&#8221; they found.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=107320&#038;WT.svl=news2_1<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2157","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2157"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2157\/revisions"}],"predecessor-version":[{"id":4644,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2157\/revisions\/4644"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}