Application Control remains one of the best techniques for blocking the vast majority of malware threats; however, implementation often falters due to poor planning.
Is Whitelisting Worth It?
When it comes to preventing new attacks, whitelisting will always be the best option. While this seems to be an agreed upon truth in the cybersecurity community, there is still hesitancy among professionals to deploy this solution. The perception seems to be that whitelisting, although effective, is too difficult to implement. The truth of the matter is that successful deployment of application control and whitelisting requires behavior change—but that doesn’t mean you shouldn’t do it.
There’s no point sugarcoating it, behavior change is hard, and organizational behavior change is even harder. But it can be done. The key is communication—before, during and after the process. We understand that application control can be a headache to deploy, but the reward is worth the growing pains.
6 Steps For Success
In order to help make the process a little easier for you, Carbon Black has created a blueprint for successful deployment of application control and whitelisting which is comprised of six steps:
- Evaluate work processes
- Balance productivity and risk
- Create a working group
- Accommodate the need for change
- Create a Pilot
- Rollout – Priorities and Pilot Experience
Evaluate Work Processes
Today I want to take a look at the first step. As mentioned above, it’s important to understand that communication is integral to the successful deployment of application control. There will be people in your organization who are eager for this change, and those who are hesitant. For this implementation to work, everyone must be comfortable, looped in, and on board.
Endpoints are where the most productivity occurs in an organization, and security and operations teams won’t always be in agreement with one another about the best ways to protect them. To succeed, you must first understand work processes in your organization. Are employees accustomed to downloading whatever, whenever? Or are there more security checks and balances? You’ll need to speak with stakeholders and users to understand what impact application control and whitelisting will have in practice. Without this crucial information about how people are getting their work done, you can’t possibly figure out how to increase security without impacting productivity.
Want to know more? If you’re interested in learning about steps 2-6, register for our upcoming webinar, Six Easy Steps for Deploying Application Control.