No single technology guarantees security, however application whitelisting covers situations not addressed by firewalls or anti-virus utilities. This paper from Faronics focuses on how application whitelisting can be effectively used as an important layer in your security scenario. It examines other security layers as well, and demonstrates how whitelisting compliments and augments existing defenses. It also discusses the limitations and difficulties inherent in various existing defenses.
The concept of a layered protection strategy—or “defense in depth”—is fairly well known. But many IT professionals overlook what can be one of the strongest layers of defense available—application whitelisting.