Employees who install and use legitimate but unauthorized applications, such as instant messaging, file sharing, games and virtualization software, are a real and growing threat to business security and productivity. Removable storage drives make the challenge of securing data and controlling application use even more complex. This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches, and highlights how integrating this functionality into malware protection is the simplest and most cost-effective solution.
The changing perspective
A workforce, reared on social networking and mobile technologies, is bringing a different perspective to how computers are used within an organization. With a mindset that is highly tuned to sharing information with friends, employees are running unauthorized applications on their corporate-owned PCs unbeknownst to their IT departments.