Faronics Anti-executable Compared to Limited (Restrictive) Users and Group Policies

Many organizations use limited (restricted) users and system policies and group policies to ensure users cannot access certain areas of the computer or install most off-the-shelf software. However, these approaches require the network administrator to be very knowledgeable, and to spend large amounts of time setting and maintaining the policies. The alternative: a whitelist-based security solution.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Comparing the Total Cost of Ownership of Business Intelligence Solutions

For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions.
  • Written By:
  • Published On:

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision.
  • Written By:
  • Published On:

Non-Traditional Hours: Key Strategies for Creating Flexible and Productive Work Schedules

Enabled by technology, more and more companies are now allowing—and, in some cases, requiring—employees to work flexible schedules. In this era of VoIP, Skype, cloud apps, and mobile devices, some employees really can be as productive (or more so) working off-site. The advantages for companies begin with more engaged, productive workers, and lower overhead costs. So know what you need to consider for flexible work arrangements and the golden rules for developing flexible work policies.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Non-restrictive Technology in Computer-based Businesses and Services

Typically, there are two approaches to managing public access and workplace workstations: the lock-down approach, and the reactionary approach. However, despite the variety of public access or corporate computer environments that exist, non-restrictive technology is applicable to all of them. With this technology in place, users can use workstations as they desire, but downtime and technical support costs are eliminated.
  • Written By:
  • Published On:

Best of breed versus Suite Anti-spyware

The anti-spyware industry is going in two separate directions. First, there are suite products that come with other security applications, along with anti-spyware. Second, there are best-of-breed products that are purely focused on detecting and eradicating spyware. Depending on the type of organization, choosing a suite-based anti-spyware over best-of-breed software can leave a company vulnerable.
  • Written By:
  • Published On:

Spyware versus Viruses

At first glance, spyware and computer viruses appear to have much in common. But in fact, spyware is a unique challenge. Unlike viruses, the motivation behind spyware is financial, which has driven rapid technical innovation and broad distribution. The first line of defense is education; understanding the unique threat spyware poses is the first step in a plan for protection.
  • Written By:
  • Published On: