Hi {{ session.user.profile.firstName }}

Trust-Based Application Control 101

Manage webcast
Ian Lee, Director of Product Marketing, Bit9
With 2% to 8% of enterprise PCs are infected with malware at any given time, 80% of data stolen coming from servers within enterprises, incident analysis shows that traditional protection tools such as anti-virus offer even more dismal protection when faced with low-volume targeted attacks.

Gartner recommends Application Control and Whitelisting as "foundational" to protect endpoints, ensuring that only authorized software can run, rendering the APT useless and ensuring you never get malware again.

Success requires a simple, adaptive approach that follows the 4 key components of Trust, Detect, Protect and Measure to allow you to:

· Understand the trust of all software in your enterprise

· Identify high risk files and users

· Stop Advanced Persistent Threats

· Measure your ongoing risk and compliance posture
Mar 15 2012
41 mins
Trust-Based Application Control 101
More from this community:

IT Security

  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Trust-Based Application Control 101
  • Live at: Mar 15 2012 1:00 pm
  • Presented by: Ian Lee, Director of Product Marketing, Bit9
  • From:
Your email has been sent.
or close
You must be logged in to email this