RSS FeedBlogs
RSS FeedSubscribe to this blog
About Author
Forrester Analysts

Forrester Research is a technology and market research company that provides pragmatic advice to global leaders in business and technology.



Application whitelisting offers a tantalising alternative to popular 'Whac-A-Mole' antivirus strategies

Traditional antivirus techniques have been fighting a losing battle for years.

Article comments
Popular hacker exploit kits pounce on new vulnerabilities quickly while advanced toolssuch as polymorphic viruses to propagate their malicious intents.  As a result, signature databases (known as “blacklists”) have ballooned in size, causing strain on a company’s infrastructure and endpoint performance. Combined with the fact that antivirus vendors miss a significant number of the unknown or zero-day threats, many security professionals are left questioning their antivirus-centric approach to endpoint protection. As the number of malware samples rise, this traditional "Whac-A-Mole" blacklist strategy of signature-based antivirus protection is simply un-scalable.

In our new report “Application Control: An Essential Endpoint Security Component”, my colleague Chenxi Wang and I discuss the importance of supplementing antivirus with application control in an effort to reduce the number of potential avenues for attack (otherwise known as the endpoint’s attack surface). One of the most promising forms of application control comes in the form of application whitelisting. Whereas traditional antivirus technologies laboriously scan every file on the endpoint looking for known bad scripts, whitelisting takes a very different approach and blocks everything except those applications known to be trusted. This leads to faster endpoint performance and overall better protection against zero-day threats when compared to traditional antivirus techniques.

Now of course, there are operational challenges that make the move to a whitelisting approach difficult in certain environments. Organisations will sometimes struggle with building an initial whitelist, and there can be many difficulties maintaining one once it’s set in place, especially in dynamic environments. Deciding which application is necessary and which should be eliminated is not a trivial task. However, at the end of the day you are left with an endpoint environment with less reliance on antivirus techniques and a significantly reduced attack surface.

For more information on the challenges and benefits of application control, as well as how the attack surface can be further mitigated through targeted patch management and privilege management, look to our published report. And as always, we welcome your comments below.

Guest Post From Researcher Chris Sherman @ChrisShermanFR
Enhanced by Zemanta


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
* *