Security and Compliance Readiness: Making Risk Visible and Remediation Automatic
Source: Shavlik Technologies
Obvious problems including viruses, spyware, and Trojans can arise when any kind of application can be loaded on company servers and PCs without raising questions. In addibon, many employees may load out-of-policy software onto their PCs (I.E., iTunes, IM, Skype, WeatherBug, etc.) which could introduce unexpected vulnerabilities or simply cause productivity or network bandwidth issues. Consequently, the only safe approach is to assume that any program not specifically authorized by security administrators is potentially dangerous. An application control scans each machine to detect and remove any unauthorized programs. Obviously, because a rogue program can cause serious damage in a very short time, the application control must constantly monitor all network machines and eradicate any code that is not included in the authorized software repository.