How unauthorized applications impact security and how you can take back control

Employees who install and use legitimate but unauthorized applications, such as instant messaging, file sharing, games and virtualization software, are a real and growing threat to business security and productivity. Removable storage drives make the challenge of securing data and controlling application use even more complex. This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches, and highlights how integrating this functionality into malware protection is the simplest and most cost-effective solution.

Sophos Apr 12th 2010 A-A+

Summary:

Employees who install and use legitimate but unauthorized applications, such as instant messaging, file sharing, games and virtualization software, are a real and growing threat to business security and productivity. Removable storage drives make the challenge of securing data and controlling application use even more complex. This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches, and highlights how integrating this functionality into malware protection is the simplest and most cost-effective solution.

The changing perspective
A workforce, reared on social networking and mobile technologies, is bringing a different perspective to how computers are used within an organization. With a mindset that is highly tuned to sharing information with friends, employees are running unauthorized applications on their corporate-owned PCs unbeknownst to their IT departments.

To download the full whitepaper/case study, please provide the following information:
Image CAPTCHA
Enter the characters shown in the image.