Protect Your Desktops from Malware and Unauthorized Software. “We found 51 games installed on a problematic PC in our ER department.”. “We found iTunes running on plastics cutting machines.”. “Some of our call center reps had 6 IM tools running while being on a call.”.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Protect Your Desktops from
Malware and Unauthorized Software
51 games installed
on a problematic PC
in our ER department.”
plastics cutting machines.”
“Some of our call
center reps had
6 IM tools running
on a call.”
Tries to keep a list of all bad software
Tries to identify bad behavior
Lets unrecognized executables run
Using the most popular antivirus applications …
8 out of 10 pieces of malicious code are going to get in”.
New threats continually
outsmart existing defenses
Computers polluted with illegal and unauthorized software
Disruptive software causing down time and unnecessary support calls
Mainstream approaches have proven unsuccessful
The need …
Manageable and effective approach to controlling all unauthorized software.
Complexity of Administration
Mark Bregman, CTO
“Eventually, a comprehensive whitelist of legitimate software may be as close to a silver bullet as one can hope to find – one that best serves the evolving security needs of the growing cybercommunity.
John Thompson, CEO
“I'll be chasing my tail forever trying to block every one of those things. ”
David Cross, Product Unit Manager
“Microsoft wants to make better use of things such as application whitelisting, which prevents any application from running other than those explicitly allowed by the user.”
John Stewart, CSO
"I am not so sure that we can get to a place of feeling confident in our infrastructure without doing whitelisting“.
“Whitelisting is the next generation of defense“
Dave DeWalt, CEO
“Blacklisting — where vendors compile lists of known malware — has become technically unfeasible.”
“As blacklisting becomes increasingly difficult, whitelisting holds promise.”
Bit9 ensures that only approved software runs.
Bit9’s Hosted Web Service
External Data Sources
Bit9 Parity Server
6B+ File Records
Block & Ask
Automated Software Categorization
Automated Vista Compatibility
The easiest way to control what can and can’t run on your Windows computers.