Report, Detect & Respond – Whitelisting is The Data Protection Key
Digital data is always vulnerable, and if you think that no one would bother to break into your office and steal your hard drive, global connectivity puts your data at risk from cyber-attack, regardless of where it is stored. As long as we’ve used ones and zeros to store and send our data, there has always been the dark side, professional programmers who create malicious code, and it’s a cat and mouse game with the good and bad guys, a breach is found in security and then it is plugged, and so it goes on. Protecting one’s data is of paramount importance, and this has traditionally been the role of the anti-virus software, which stores a huge database that contains information on every known virus. As you can imagine, these virus databases are huge, perhaps as much as 200mb, and they need to be updated daily, as new and potentially harmful viruses emerge.
When the user fires up their computer, apart from the operating system opening, the blacklisting anti-virus software must now scan absolutely everything on the hard drive, making sure there are no known viruses present. This might be fine, you would think, yet this process must occur frequently and that drains your computing resources, as the CPU is tied up with the anti-virus requests that are constantly coming in. On a typical network, you could lose up to 40% of your computing power, all because of data protection. Blacklisting only sees viruses it knows about, so against any new virus, it offers zero protection, and for a business, that simply is not an option.
For those who wish to have full protection without losing their IT resources, application whitelisting products are the perfect solution. Whitelisting differs from blacklisting, because it only allows known and trusted files to run. If a file is not on the whitelist, it cannot be opened, and you simply can’t get any better than that. Furthermore, once installed, the whitelisting software empowers you in other ways, as you can track and discover where any file originated, and with quarantine facilities, you, the administrator, can configure the system to your needs.
Detection & Reporting
If it isn’t on the list of applications that can operate, then it doesn’t get a chance to infest your computer. Once an alarm is raised, and something suspicious is trying to open, you can quickly locate it, find out who sent it and some details about its make up. The easy to use interface allows you to control any sized network, and the same system can be configured for a one man business or a multi-national corporation.
Free Up IT Resources
Whitelisting does not require huge amounts of data to operate. There is no virus database, as it is not necessary. The whitelist itself, which is created by you, only allows files you authorise to be opened, and it works tirelessly in the background, without using your resources, and that means your staff will produce more, as their computer will be more responsive.