In either case, the organization creates a list of applications that are given special access to the network.Īpplication whitelisting may be used to grant access to a specific service, or it may be required for the application to run at all. To implement application whitelisting, the IT organization may use technologies that are built into the host operating system or leverage the capabilities of a more sophisticated security tool. Application Whitelisting What is Application Whitelisting?Īpplication whitelisting is a common method used by IT organizations to secure on-premise and cloud-based networks and infrastructure against malicious cyber attacks and unwanted network penetration.
0 Comments
Leave a Reply. |