The First Step to Deploying Application Control

Share and earn Cybytes
Facebook Twitter LinkedIn Email


Is Whitelisting Worth It?

When it comes to preventing new attacks, whitelisting will always be the best option.   While this seems to be an agreed upon truth in the cybersecurity community, there is still hesitancy among professionals to deploy this solution.  The perception seems to be that whitelisting, although effective, is too difficult to implement. The truth of the matter is that successful deployment of application control and whitelisting requires behavior changebut that doesn’t mean you shouldn’t do it.  

There’s no point sugarcoating it, behavior change is hard, and organizational behavior change is even harder.  But it can be done. The key is communicationbefore, during and after the process. We understand that application control can be a headache to deploy, but the reward is worth the growing pains.  

6 Steps For Success

In order to help make the process a little easier for you, Carbon Black has created a blueprint for successful deployment of application control and whitelisting which is comprised of six steps:

  1. Evaluate work processes
  2. Balance productivity and risk
  3. Create a working group
  4. Accommodate the need for change
  5. Create a Pilot
  6. Rollout – Priorities and Pilot Experience

Evaluate Work Processes

Today I want to take a look at the first step. As mentioned above, it’s important to understand that communication is integral to the successful deployment of application control.  There will be people in your organization who are eager for this change, and those who are hesitant.  For this implementation to work, everyone must be comfortable, looped in, and on board.

Endpoints are where the most productivity occurs in an organization, and security and operations teams won’t always be in agreement with one another about the best ways to protect them.  To succeed, you must first understand work processes in your organization. Are employees accustomed to downloading whatever, whenever? Or are there more security checks and balances? You’ll need to speak with stakeholders and users to understand what impact application control and whitelisting will have in practice.  Without this crucial information about how people are getting their work done, you can’t possibly figure out how to increase security without impacting productivity.

Want to know more?  If you’re interested in learning about steps 2-6, register for our upcoming webinar, Six Easy Steps for Deploying Application Control.

Save Your Seat

The post The First Step to Deploying Application Control appeared first on Carbon Black.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Carbon Black, Inc.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?