The First Step to Deploying Application Control

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

 

Is Whitelisting Worth It?

When it comes to preventing new attacks, whitelisting will always be the best option.   While this seems to be an agreed upon truth in the cybersecurity community, there is still hesitancy among professionals to deploy this solution.  The perception seems to be that whitelisting, although effective, is too difficult to implement. The truth of the matter is that successful deployment of application control and whitelisting requires behavior changebut that doesn’t mean you shouldn’t do it.  

There’s no point sugarcoating it, behavior change is hard, and organizational behavior change is even harder.  But it can be done. The key is communicationbefore, during and after the process. We understand that application control can be a headache to deploy, but the reward is worth the growing pains.  

6 Steps For Success

In order to help make the process a little easier for you, Carbon Black has created a blueprint for successful deployment of application control and whitelisting which is comprised of six steps:

  1. Evaluate work processes
  2. Balance productivity and risk
  3. Create a working group
  4. Accommodate the need for change
  5. Create a Pilot
  6. Rollout – Priorities and Pilot Experience

Evaluate Work Processes

Today I want to take a look at the first step. As mentioned above, it’s important to understand that communication is integral to the successful deployment of application control.  There will be people in your organization who are eager for this change, and those who are hesitant.  For this implementation to work, everyone must be comfortable, looped in, and on board.

Endpoints are where the most productivity occurs in an organization, and security and operations teams won’t always be in agreement with one another about the best ways to protect them.  To succeed, you must first understand work processes in your organization. Are employees accustomed to downloading whatever, whenever? Or are there more security checks and balances? You’ll need to speak with stakeholders and users to understand what impact application control and whitelisting will have in practice.  Without this crucial information about how people are getting their work done, you can’t possibly figure out how to increase security without impacting productivity.

Want to know more?  If you’re interested in learning about steps 2-6, register for our upcoming webinar, Six Easy Steps for Deploying Application Control.

Save Your Seat

The post The First Step to Deploying Application Control appeared first on Carbon Black.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
75 Followers
About Carbon Black, Inc.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.
Promoted Content
7 Experts on Moving to a Cloud-Based Endpoint Security Platform
Everyday companies put more of their assets in digital form. Healthcare records, retail purchases and personnel files are just some of the many examples of how our entire lives have moved online. While this makes our interconnected lives more convenient, it also makes them more vulnerable to attack. The monetary benefits of exploiting these vulnerabilities have created an extremely profitable underground economy; one that mimics the same one we all participate in and has led to an increase in the sophistication and frequency of attacks. At the same time, mobility and cloud are changing the security landscape. We’ve moved from a centralized to a decentralized model as end users increasingly work on-the-go and access critical business applications and resources from anywhere. As such there is more emphasis on the endpoint and individual identities - from both the defender and the attacker - than ever before. As endpoints become smarter, new challenges emerge: emerging ransomware and 0-day exploits infect all kinds of systems with ease, while many attackers use no malware at all to accomplish their malicious goals. With all this change, we spoke to 7 leading security experts to identify what’s working and how they’ve influenced their organization to make the necessary changes before becoming the next victim.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel