SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
CoreTrace Continues to Knock Down
Application Whitelisting Barriers

       Abstract
       On the 23rd of June 2009, CoreTrace, a leader in application whitelisting announced new technology
       enhancements to ease the deployment and implementation of its flagship BOUNCER product. Endpoint
       anti-malware software is quite simply not up to the challenge of proactively meeting the current climate of
       sophisticated attacks against IT infrastructure. In fact, many security
       professionals have already completely lost confidence in the capabilities
       delivered by traditional blacklist anti-malware solutions. Whitelist
       technology, or rather technology purposed to allow only non-malicious
                                                                                      Endpoint anti-malware
       applications to run may be the last hope for these professionals.           software is quite simply not
       Unfortunately, whitelist technology has been relatively slow in adoption
       largely due to difficulties in deployment and maintenance. CoreTrace is
                                                                                      up to the challenge of
       attempting to ease these burdens through advances in enhanced                 proactively meeting the
       deployment and administration technology. These advancements
       drastically simplify the adoption of whitelist technology and could,
                                                                                          current climate of
       rather likely will, shake up the way professionals view their endpoint          sophisticated attacks
       security strategies.                                                          against IT infrastructure.
       Context
       Malware is running rampant throughout home user, Small-to-Medium Businesses (SMB), and enterprises IT
       infrastructures. It is unfortunate that the original combatants of malicious software creators felt that the best
       way to battle these attackers was through the detection of malicious activity instead of controlling non-
       malicious environments. In other words, the earliest days of endpoint security relied solely on determining
       pre-existing issues and mitigating those issues. As a result of this early strategy, nearly the entire IT world has
       been more-or-less married to the idea of so-called “blacklist” endpoint security.
       Unfortunately, these blacklist endpoint anti-malware technologies are largely ineffective in today’s climate of
       sophisticated, constantly evolving attack methodologies. In fact, blacklist endpoint security capabilities are
       flawed by design. In a blacklist strategy, there will be at least one (although more likely thousands) infected
       machine for every effective blacklist detection. This reactive strategy has engaged security professionals in an
       unwinnable rat race where they are constantly trying to catch up to the advancing sophistication of attackers.
       Fortunately, an up-and-coming alternative to blacklist anti-malware has continued to proliferate into IT
       security standards. Whitelist technology, or rather technology specifically purposed to allow only legitimate,
       non-malicious applications to run and deny all others has emerged as a potential successor to the current
       standard of blacklist anti-malware. The technology is theoretically far more effective and more scalable to
       long-term enterprise strategies. Furthermore, the technology is proactive! This of course removes IT security
       from the unwinnable race of constantly determining what attackers have done.
       Why has this technology not been adopted more quickly? The answer is quite simply deployment and
       maintenance. Unfortunately, whitelist application security technology has historically come with a great deal
       of management overhead. Not only have organizations found it difficult to determine which applications can
       be considered legitimate, they have also struggled to evolve with changes to their environment. Furthermore,
       enforcement and configuration management have also been issues for application whitelisting.




EMA IMPACT BRIEF
-1-                                                                                          ©2009 Enterprise Management Associates
CoreTrace Continues to Knock Down
Application Whitelisting Barriers

       Event
       As a result, CoreTrace, a leader in application whitelisting has announced several new enhancements to its
       flagship BOUNCER solution. These innovations include multiple endpoint deployment and automatic
       whitelist enforcement capabilities. In addition to these core enhancements, CoreTrace has attempted to
       alleviate some of the issues associated with real-world implementation of endpoint security through the
       integration of group security policies.
       Because of these enhancements, CoreTrace is now capable of silencing
       the opponents of whitelist application security through directly               CoreTrace is now capable
       addressing concerns over management and deployment overhead. To
       be prescriptive, CoreTrace alleviates concerns over deployment by              of silencing the opponents
       introducing new technology for multiple endpoint deployments through             of whitelist application
       technology integrations with technology such as Active Directory. Once
       BOUNCER has been deployed to multiple end-points, it immediately                security through directly
       begins protecting each individual endpoint through the auto-generation         addressing concerns over
       and automatic policy enforcement on each of these endpoints. Further
       speaking to the advanced technology of CoreTrace is the fact that the
                                                                                           management and
       automatic endpoint protection delivered through BOUNCER is not                   deployment overhead.
       intrusive unless specifically configured to be intrusive.

       Key Ramifications
           •   CoreTrace BOUNCER positioned with easier deployment: The rollout of endpoint anti-malware can take
               months, even years to properly deploy. The latest release of CoreTrace BOUNCER drastically
               simplifies this process by taking advantage of key technologies such as active directory. Furthermore,
               BOUNCER seamlessly integrates with an environment by auto-generating whitelists for individual
               systems.
           •   Improved manageability of whitelist anti-malware: CoreTrace BOUNCER introduces improved
               manageability in its latest release through granular group security configurations and auto updates for
               new trusted applications. The latter includes the ability to handle new applications and upgrades
               through low friction digital signatures and trusted ActiveX installations.
           •   Enhanced memory protection increases the prevention of malware: The latest release of BOUNCER includes
               advanced protection capabilities to prevent malicious applications from injecting Dynamic Link
               Libraries (DLL’s) and writing to kernel memory. This translates to more effective blocking of
               malicious applications and payloads.

       EMA Perspective
       ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts do not in any way believe that blacklist
       anti-malware technology is “dead.” Blacklist anti-malware is very much alive and extremely necessary,
       especially in home user markets where whitelist technology is far less applicable (based primarily on
       management). However, EMA sees the days of blacklist technology as the de facto endpoint solution within
       SMBs, enterprises, and government spaces at an end.
       Although these solutions may play a large role as a secondary solution, the technology that functions as the
       backbone for blacklist anti-malware is inherently flawed and alone is simply not effective for the issues of
       today or tomorrow. Organizations that continue to invest in these technologies as the de facto endpoint




EMA IMPACT BRIEF
-2-                                                                                       ©2009 Enterprise Management Associates
CoreTrace Continues to Knock Down
Application Whitelisting Barriers
       solution will find that it is far less expensive to integrate effective
       whitelist technologies than it is to create the complex, interoperable                          As organizations continue to
       layered security scheme necessary to make blacklist anti-malware
       solutions effective.
                                                                                                        experience issues relating
       CoreTrace is particularly well suited to capitalize on moving products
                                                                                                         to ineffective and bloated
       into organizations that recognize this reality. CoreTrace continues to                          endpoint technologies, EMA
       directly address the barriers that slow the adoption of endpoint whitelist
       anti-malware and continually enhance the effectiveness of its
                                                                                                        fully expects CoreTrace to
       BOUNCER product. As organizations continue to experience issues                                 move closer to the forefront
       relating to ineffective and bloated endpoint technologies, EMA fully
       expects CoreTrace to move closer to the forefront of endpoint security
                                                                                                       of endpoint security leaders.
       leaders. The only real question left is how long will it take the industry to
       recognize its issue and adopt CoreTrace solutions?




       About EMA
       Founded in 1996, Enterprise Management Associates (EMA) is a leading industry analyst firm that specializes in going “beyond
       the surface” to provide deep insight across the full spectrum of IT management technologies. EMA analysts leverage a unique
       combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor
       solutions to help its clients achieve their goals. Learn more about EMA research, analysis, and consulting services for enterprise
       IT professionals and IT vendors at www.enterprisemanagement.com or follow EMA on Twitter (http://twitter.com/ema_research).
                                                                                                                                   1916.071609




EMA IMPACT BRIEF
-3-                                                                                                        ©2009 Enterprise Management Associates

Contenu connexe

En vedette

CAPS writes to State officials: March 23rd Surgeon General's press conference...
CAPS writes to State officials: March 23rd Surgeon General's press conference...CAPS writes to State officials: March 23rd Surgeon General's press conference...
CAPS writes to State officials: March 23rd Surgeon General's press conference...eilily Community Access Project, Somerville
 
5 Quick Steps To Your Smarter Financial Self
5 Quick Steps To Your Smarter Financial Self5 Quick Steps To Your Smarter Financial Self
5 Quick Steps To Your Smarter Financial SelfD. Yang
 
212 events and promotion dates
212 events and promotion dates212 events and promotion dates
212 events and promotion datesmodtaekwondoutah
 
[OpenCamp 2010] You Don't Know Click: Measuring What Matters in Social Media
[OpenCamp 2010] You Don't Know Click: Measuring What Matters in Social Media[OpenCamp 2010] You Don't Know Click: Measuring What Matters in Social Media
[OpenCamp 2010] You Don't Know Click: Measuring What Matters in Social MediaEric Swayne
 
Fostering Collaboration UK and Indonesia Universities
Fostering Collaboration UK and Indonesia UniversitiesFostering Collaboration UK and Indonesia Universities
Fostering Collaboration UK and Indonesia Universitiesguest68abaf
 
Visual Dictionary 2 of 2
Visual Dictionary 2 of 2Visual Dictionary 2 of 2
Visual Dictionary 2 of 2spandrel
 
Ogx management presentation v3
Ogx management presentation v3Ogx management presentation v3
Ogx management presentation v3Ogx2011
 
2010 Chick Fil A Leadercast In Dallas
2010 Chick Fil A Leadercast In Dallas2010 Chick Fil A Leadercast In Dallas
2010 Chick Fil A Leadercast In DallasWilliam Overby
 
Ted presentation
Ted presentationTed presentation
Ted presentationcpiek
 

En vedette (16)

CAPS writes to State officials: March 23rd Surgeon General's press conference...
CAPS writes to State officials: March 23rd Surgeon General's press conference...CAPS writes to State officials: March 23rd Surgeon General's press conference...
CAPS writes to State officials: March 23rd Surgeon General's press conference...
 
BTLE Information
BTLE InformationBTLE Information
BTLE Information
 
Romania conference
Romania conferenceRomania conference
Romania conference
 
5 Quick Steps To Your Smarter Financial Self
5 Quick Steps To Your Smarter Financial Self5 Quick Steps To Your Smarter Financial Self
5 Quick Steps To Your Smarter Financial Self
 
Portfolio
PortfolioPortfolio
Portfolio
 
212 events and promotion dates
212 events and promotion dates212 events and promotion dates
212 events and promotion dates
 
Hiragana ten ten
Hiragana ten tenHiragana ten ten
Hiragana ten ten
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
[OpenCamp 2010] You Don't Know Click: Measuring What Matters in Social Media
[OpenCamp 2010] You Don't Know Click: Measuring What Matters in Social Media[OpenCamp 2010] You Don't Know Click: Measuring What Matters in Social Media
[OpenCamp 2010] You Don't Know Click: Measuring What Matters in Social Media
 
Adroit Ppt
Adroit PptAdroit Ppt
Adroit Ppt
 
Fostering Collaboration UK and Indonesia Universities
Fostering Collaboration UK and Indonesia UniversitiesFostering Collaboration UK and Indonesia Universities
Fostering Collaboration UK and Indonesia Universities
 
Visual Dictionary 2 of 2
Visual Dictionary 2 of 2Visual Dictionary 2 of 2
Visual Dictionary 2 of 2
 
Dn13 u3 a37_yia
Dn13 u3 a37_yiaDn13 u3 a37_yia
Dn13 u3 a37_yia
 
Ogx management presentation v3
Ogx management presentation v3Ogx management presentation v3
Ogx management presentation v3
 
2010 Chick Fil A Leadercast In Dallas
2010 Chick Fil A Leadercast In Dallas2010 Chick Fil A Leadercast In Dallas
2010 Chick Fil A Leadercast In Dallas
 
Ted presentation
Ted presentationTed presentation
Ted presentation
 

Plus de CoreTrace Corporation

Moskowitz Whitepaper Microsoft App Locker And Beyond
Moskowitz Whitepaper  Microsoft App Locker And BeyondMoskowitz Whitepaper  Microsoft App Locker And Beyond
Moskowitz Whitepaper Microsoft App Locker And BeyondCoreTrace Corporation
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Corporation
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Corporation
 
CoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Corporation
 
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI AnalysisCoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI AnalysisCoreTrace Corporation
 
CoreTrace Whitepaper: Combating Buffer Overflows And Rootkits
CoreTrace Whitepaper: Combating Buffer Overflows And RootkitsCoreTrace Whitepaper: Combating Buffer Overflows And Rootkits
CoreTrace Whitepaper: Combating Buffer Overflows And RootkitsCoreTrace Corporation
 
CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security ParadigmCoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security ParadigmCoreTrace Corporation
 
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesNetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesCoreTrace Corporation
 
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 ComplianceFeldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 ComplianceCoreTrace Corporation
 
Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:CoreTrace Corporation
 

Plus de CoreTrace Corporation (11)

Moskowitz Whitepaper Microsoft App Locker And Beyond
Moskowitz Whitepaper  Microsoft App Locker And BeyondMoskowitz Whitepaper  Microsoft App Locker And Beyond
Moskowitz Whitepaper Microsoft App Locker And Beyond
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
CoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And Data
 
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI AnalysisCoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
 
CoreTrace Whitepaper: Combating Buffer Overflows And Rootkits
CoreTrace Whitepaper: Combating Buffer Overflows And RootkitsCoreTrace Whitepaper: Combating Buffer Overflows And Rootkits
CoreTrace Whitepaper: Combating Buffer Overflows And Rootkits
 
CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security ParadigmCoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
 
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesNetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
 
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 ComplianceFeldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:
 

Dernier

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Dernier (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

EMA Whitepaper: CoreTrace Continues To Knock Down Application Whitelisting Barriers

  • 1. CoreTrace Continues to Knock Down Application Whitelisting Barriers Abstract On the 23rd of June 2009, CoreTrace, a leader in application whitelisting announced new technology enhancements to ease the deployment and implementation of its flagship BOUNCER product. Endpoint anti-malware software is quite simply not up to the challenge of proactively meeting the current climate of sophisticated attacks against IT infrastructure. In fact, many security professionals have already completely lost confidence in the capabilities delivered by traditional blacklist anti-malware solutions. Whitelist technology, or rather technology purposed to allow only non-malicious Endpoint anti-malware applications to run may be the last hope for these professionals. software is quite simply not Unfortunately, whitelist technology has been relatively slow in adoption largely due to difficulties in deployment and maintenance. CoreTrace is up to the challenge of attempting to ease these burdens through advances in enhanced proactively meeting the deployment and administration technology. These advancements drastically simplify the adoption of whitelist technology and could, current climate of rather likely will, shake up the way professionals view their endpoint sophisticated attacks security strategies. against IT infrastructure. Context Malware is running rampant throughout home user, Small-to-Medium Businesses (SMB), and enterprises IT infrastructures. It is unfortunate that the original combatants of malicious software creators felt that the best way to battle these attackers was through the detection of malicious activity instead of controlling non- malicious environments. In other words, the earliest days of endpoint security relied solely on determining pre-existing issues and mitigating those issues. As a result of this early strategy, nearly the entire IT world has been more-or-less married to the idea of so-called “blacklist” endpoint security. Unfortunately, these blacklist endpoint anti-malware technologies are largely ineffective in today’s climate of sophisticated, constantly evolving attack methodologies. In fact, blacklist endpoint security capabilities are flawed by design. In a blacklist strategy, there will be at least one (although more likely thousands) infected machine for every effective blacklist detection. This reactive strategy has engaged security professionals in an unwinnable rat race where they are constantly trying to catch up to the advancing sophistication of attackers. Fortunately, an up-and-coming alternative to blacklist anti-malware has continued to proliferate into IT security standards. Whitelist technology, or rather technology specifically purposed to allow only legitimate, non-malicious applications to run and deny all others has emerged as a potential successor to the current standard of blacklist anti-malware. The technology is theoretically far more effective and more scalable to long-term enterprise strategies. Furthermore, the technology is proactive! This of course removes IT security from the unwinnable race of constantly determining what attackers have done. Why has this technology not been adopted more quickly? The answer is quite simply deployment and maintenance. Unfortunately, whitelist application security technology has historically come with a great deal of management overhead. Not only have organizations found it difficult to determine which applications can be considered legitimate, they have also struggled to evolve with changes to their environment. Furthermore, enforcement and configuration management have also been issues for application whitelisting. EMA IMPACT BRIEF -1- ©2009 Enterprise Management Associates
  • 2. CoreTrace Continues to Knock Down Application Whitelisting Barriers Event As a result, CoreTrace, a leader in application whitelisting has announced several new enhancements to its flagship BOUNCER solution. These innovations include multiple endpoint deployment and automatic whitelist enforcement capabilities. In addition to these core enhancements, CoreTrace has attempted to alleviate some of the issues associated with real-world implementation of endpoint security through the integration of group security policies. Because of these enhancements, CoreTrace is now capable of silencing the opponents of whitelist application security through directly CoreTrace is now capable addressing concerns over management and deployment overhead. To be prescriptive, CoreTrace alleviates concerns over deployment by of silencing the opponents introducing new technology for multiple endpoint deployments through of whitelist application technology integrations with technology such as Active Directory. Once BOUNCER has been deployed to multiple end-points, it immediately security through directly begins protecting each individual endpoint through the auto-generation addressing concerns over and automatic policy enforcement on each of these endpoints. Further speaking to the advanced technology of CoreTrace is the fact that the management and automatic endpoint protection delivered through BOUNCER is not deployment overhead. intrusive unless specifically configured to be intrusive. Key Ramifications • CoreTrace BOUNCER positioned with easier deployment: The rollout of endpoint anti-malware can take months, even years to properly deploy. The latest release of CoreTrace BOUNCER drastically simplifies this process by taking advantage of key technologies such as active directory. Furthermore, BOUNCER seamlessly integrates with an environment by auto-generating whitelists for individual systems. • Improved manageability of whitelist anti-malware: CoreTrace BOUNCER introduces improved manageability in its latest release through granular group security configurations and auto updates for new trusted applications. The latter includes the ability to handle new applications and upgrades through low friction digital signatures and trusted ActiveX installations. • Enhanced memory protection increases the prevention of malware: The latest release of BOUNCER includes advanced protection capabilities to prevent malicious applications from injecting Dynamic Link Libraries (DLL’s) and writing to kernel memory. This translates to more effective blocking of malicious applications and payloads. EMA Perspective ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts do not in any way believe that blacklist anti-malware technology is “dead.” Blacklist anti-malware is very much alive and extremely necessary, especially in home user markets where whitelist technology is far less applicable (based primarily on management). However, EMA sees the days of blacklist technology as the de facto endpoint solution within SMBs, enterprises, and government spaces at an end. Although these solutions may play a large role as a secondary solution, the technology that functions as the backbone for blacklist anti-malware is inherently flawed and alone is simply not effective for the issues of today or tomorrow. Organizations that continue to invest in these technologies as the de facto endpoint EMA IMPACT BRIEF -2- ©2009 Enterprise Management Associates
  • 3. CoreTrace Continues to Knock Down Application Whitelisting Barriers solution will find that it is far less expensive to integrate effective whitelist technologies than it is to create the complex, interoperable As organizations continue to layered security scheme necessary to make blacklist anti-malware solutions effective. experience issues relating CoreTrace is particularly well suited to capitalize on moving products to ineffective and bloated into organizations that recognize this reality. CoreTrace continues to endpoint technologies, EMA directly address the barriers that slow the adoption of endpoint whitelist anti-malware and continually enhance the effectiveness of its fully expects CoreTrace to BOUNCER product. As organizations continue to experience issues move closer to the forefront relating to ineffective and bloated endpoint technologies, EMA fully expects CoreTrace to move closer to the forefront of endpoint security of endpoint security leaders. leaders. The only real question left is how long will it take the industry to recognize its issue and adopt CoreTrace solutions? About EMA Founded in 1996, Enterprise Management Associates (EMA) is a leading industry analyst firm that specializes in going “beyond the surface” to provide deep insight across the full spectrum of IT management technologies. EMA analysts leverage a unique combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor solutions to help its clients achieve their goals. Learn more about EMA research, analysis, and consulting services for enterprise IT professionals and IT vendors at www.enterprisemanagement.com or follow EMA on Twitter (http://twitter.com/ema_research). 1916.071609 EMA IMPACT BRIEF -3- ©2009 Enterprise Management Associates