Tuesday, July 31, 2018

Word of the Day: application whitelisting

Word of the Day WhatIs.com
Daily updates on the latest technology terms | July 31, 2018
application whitelisting

Application whitelisting is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system. The goal of whitelisting is to protect computers and networks from potentially harmful applications.

In general, a whitelist is an index of approved entities. In infosec, whitelisting works best in centrally managed environments, where systems are subject to a consistent workload. The National Institute of Standards and Technology suggests using application whitelisting in high-risk environments, where it is vitally important that individual systems be secure and less important that software be useable without restrictions. To provide more flexibility, a whitelist may also index approved application components, such as software libraries, plug-ins, extensions and configuration files.

Application whitelisting vs. blacklisting

Unlike technologies that use application blacklisting, which prevents undesirable programs from executing, whitelisting is more restrictive and allows only programming that has been explicitly permitted to run. There is no consensus among security experts over which technique -- blacklisting or whitelisting -- is better. Proponents of blacklisting argue application whitelisting is too complex and difficult to manage. Compiling the initial whitelist, for example, requires detailed information about all users' tasks and all the applications they need to perform those tasks. Maintaining the list is also demanding because of the increasing complexity and interconnections of business processes and applications.

Proponents of whitelisting argue it is worth the time and effort needed to proactively protect systems and prevent malicious or inappropriate programs from entering the network. Using a whitelist that allows only applications that have been explicitly approved offers more protection against malicious software, rather than the looser standard used by application blacklists, which permit any software to run unless it has been discovered to be malicious and has been added to the blacklist. Read more...

Quote of the Day

 

"With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware." - Brien Posey

Learning Center

 

Mobile application management tools balance service and cost
Stand-alone mobile application management tools often provide more flexibility and specialized functionality at lower costs. Find out when stand-alone MAM tools could be a better fit for your organization than EMM suites.

How can you whitelist apps and fight ransomware with Windows 10 AppLocker?
Admins should whitelist apps with Windows 10 AppLocker to combat ransomware. Whitelisting creates a curated list of apps users can work with.

How a hybrid whitelisting-blacklisting approach can help enterprises
Application whitelisting isn't enough. Here's why a hybrid whitelisting-blacklisting approach is best for enterprise security.

Security for applications: What tools and principles work?
Ensuring security for applications means both designing security in and adding protections from without. Learn what app security tools and strategy work best.

The endpoint security controls you should consider now
Threats to endpoints are changing, and endpoint security controls must adjust to new realities. Learn what steps to take to up endpoint security now.

Quiz Yourself

 

A botnet is a group of computers organized to distribute spam or malware -- _________ the owners are typically unaware of the fact.
a. though
b. although
c. even though

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

Fact or fiction: The death of desk phones is nigh

 
Fact or fiction: The death of desk phones is nigh
Believe it or not, survey research of 505 knowledge workers published by CIO Online indicates that 74% of professionals prefer to make calls from a desk phone often to very often and 65% prefer to take their business calls on a desk phone.

Learn about Cisco’s IP phone series, designed to deliver seamless, collaborative experiences, and find out how you can:
  • Connect your staff, customers, partners, and suppliers
  • Enable high-definition video communications
  • Access third-party endpoint apps to innovate new workflows
  • And more
VIEW NOW

ABOUT THIS EMAIL

This email is published by TechTarget Networking Media Group.

Copyright 2018 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

You can unsubscribe here.

TechTarget Networking Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Protect your critical systems and equipment

 
Protect your critical systems and equipment
When it comes to power contingency, you can’t afford to leave things to chance.

Click to learn more about a consistent backup power solution designed to protect sensitive systems. Intended to minimize leakage and eliminate line noise, it also offers features such as:
  • Remote management capabilities
  • Low-profile, tip resistant design
  • And more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Data Center and Virtualization Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

CEO of Data Dynamics outlines StorageX trends, future features

Storage Digest
A roundup of storage content from TechTarget's network |July 31, 2018
TechTarget
FEATURED STORY
Data Dynamics CEO takes stock of trends, new features
Carol Sliwa, Senior News Writer

CEO Piyush Mehta outlines upcoming features designed to help Data Dynamics StorageX customers locate, analyze, migrate and manage explosively growing unstructured data in hybrid cloud environments. (SearchStorage)

Advertisement
NEWS
 
Gartner Magic Quadrant for SSDs includes Tintri, X-IO

Vendors like Tintri made Gartner’s list of competitors angling for all-flash array market share, despite a spotty fiscal history.
(Storage Soup)

 
Toshiba and Western Digital roll out 96-layer 3D NAND flash memory

Toshiba Memory America and Western Digital begin sampling 96-layer 3D NAND bit column stacked (BiCS) flash that stores four bits per cell. (Storage Soup)

 
Changes lie ahead for Commvault, but impact remains unclear

Commvault Advance will result in a new CEO, simplified product offerings and pricing, and new board members but it's impact on sales remains uncertain. (Storage Soup)

 
HPE bolsters InfoSight on flagship 3PAR platform

Building on the analytics technology HPE gained from its Nimble Storage acquisition, HPE InfoSight rollout continues across 3PAR all-flash and hybrid arrays. (SearchStorage)

EXPERT ADVICE
 
Will erasure coding render RAID obsolete?
As an alternative to RAID and block storage, object storage can be cheaper, more flexible and more accessible. But is that enough to signal the end for RAID? (SearchStorage)
 
Latest vSAN release adds HTML5, enhances iSCSI support
With vSAN 6.7, VMware has made a handful of behind-the-scenes enhancements that boost its usability in business continuity situations. Get a complete rundown of all the updates in this tip. (SearchConvergedInfrastructure)
 
 
Storage Spaces Direct hardware requirements explained
Using commodity hardware to create highly available, scalable, software-defined storage sounds straightforward, but getting it right depends on careful planning and attention to detail. (SearchStorage)
 
Finding new purpose for legacy storage devices
While switching to new storage technologies may be tempting (and in the case of some vendors, necessary) repurposing legacy storage systems could have some serious advantages. (SearchStorage)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Storage Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Storage Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

Why ERP security is weak, vulnerable and under attack

Business Applications Digest
A roundup of business applications content from TechTarget | July 31, 2018
TechTarget
FEATURED STORY
Report: ERP security is weak, vulnerable and under attack
By Patrick Thibodeau

ERP security is in trouble, according to a new report. Many ERP systems connected to the internet are insecure, and users are lagging in installing updates. Here's a look at why this is happening and what the consequences are expected to be.

(SearchERP.com)

Advertisement
NEWS
 
French transit develops chatbot with SAP Conversational AI

The transit system in the Paris metropolitan area is tackling an AI-driven chatbot project to create an easy way for riders to access personalized information. Here's a look.

(SearchSAP.com)

 

Q&A: Mike Lackey on SAP digital manufacturing

SAP head of digital manufacturing Mike Lackey discusses the SAP digital manufacturing network and how it helps manufacturers meet the demands of the new digital economy.

(SearchSAP.com)

 
ComplyRight data breach affects 662,000, gets lawsuit

ComplyRight, an HR and tax services firm, was hit with a data breach that affected 662,000 people. It has also prompted a lawsuit by a person whose data was breached.

(SearchHRSoftware.com)

 

The best HR software training documentation

With an HR software rollout in mind, review the pros and cons of an organization using its own training documentation, a vendor's material or a combination of both approaches.

(SearchHRSoftware.com)

EXPERT ADVICE
 
Single-tenant vs. multi-tenant cloud ERP -- a comparison

Choosing between single-tenant and multi-tenant cloud requires understanding what each offers and which factors are most important for your organization.

(SearchERP.com)

 

Moving to cloud workloads slow for Oracle users

A picture of steady but not rapid migration to the cloud by Oracle users emerged at Collaborate 18, with database vets saying it's wise to be selective on what to move.

(SearchOracle.com)


About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Business Applications Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Enterprise Applications Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

Securely share your data with this collaboration tool

 
Securely share your data with this collaboration tool
Collaboration is not a one-size-fits-all issue. Your organization requires a unique platform that addresses your specific needs.

Download this white paper to learn about Dropbox’s features and how it was designed to:
  • Allow collaboration directly within desktop apps you already use
  • Support unlimited file size uploads
  • Share files globally within and across teams
  • Keep your files safe with best-in-class security solutions
VIEW NOW

ABOUT THIS EMAIL

This email is published by TechTarget.

Copyright 2018 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

You can unsubscribe here.

TechTarget, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Thoughts from Google Cloud NEXT 2018 | PLUS: How to cope with the time crunch

ITKnowledgeExchange - a TechTarget Expert Community Follow us on Facebook Follow us on Twitter
 
JUL
31
Community Update
 
 
 
Thoughts from Google NEXT 2018
 
By Brian Gracely on From Silos to Services: Cloud Computing for the Enterprise

This past week, Google Cloud held their annual NEXT event in San Francisco. Brian Gracely shares the positives and negatives from the big conference.
 
 
 
 
 
 
MORE IT STORIES
 
Clean install fixes long-standing Windows 10 restart issue
 
Why ESB products aren't dead and shouldn't be buried
 
Progress VP: How to shine a light on dark data
 
 
 
 
 
How to cope with the time crunch
 
By Justin Rohrman on Uncharted Waters

When it comes to software development, dealing with deadlines and time crunches can be a difficult task. But as it turns out, there's a way to make it a lot less stressful.
 
 
 
 
 
 
MORE FROM THE TECHTARGET NETWORK
 
Why your Azure load balancer has stopped working
 
By Denny Cherry on SQL Server with Mr. Denny

If you leave an Azure Load Balancer sitting for too long with no machines behind it, you may find that the load balancer itself just stops working. But the fix is actually pretty straightforward.
 
 
 
About This Email
You're getting this email because you subscribed to Community Updates on ITKnowledgeExchange.com. If you'd no longer like to follow this tag, you can unsubscribe here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget, Member Services, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget