{"id":48310,"date":"2012-03-27T07:33:11","date_gmt":"2012-03-27T14:33:11","guid":{"rendered":"https:\/\/www.faronics.com\/?page_id=48310"},"modified":"2012-03-27T09:19:38","modified_gmt":"2012-03-27T16:19:38","slug":"webinar-application-whitelisting-the-ultimate-safeguard-against-malware","status":"publish","type":"page","link":"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware","title":{"rendered":"Webinar: Application Whitelisting: The ultimate safeguard against malware"},"content":{"rendered":"<div><a href=\"\/assets\/password_ae.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-48322\" title=\"password_ae\" src=\"\/assets\/password_ae.png\" alt=\"\" width=\"300\" height=\"233\" \/><\/a><\/div>\n<div>\n<p><a href=\"http:\/\/bit.ly\/H3q8TX\" target=\"_blank\">CLICK TO REGISTER TODAY<\/a> \u00a0for our webinar on Application Whitelisting, the ultimate safeguard against maleare.<\/p>\n<p>Attend our webinar and find out how Whitelisting solutions:<\/p>\n<ul>\n<li>provide protection against malware, allowing only pre-approved applications to run<\/li>\n<li>protect against zero-day and targeted attacks, designed to get around those blacklisting measures your typical anti-virus has in place<\/li>\n<li>improve employee productivity and workstation efficiency<\/li>\n<\/ul>\n<p>Find out how Whitelisting solutions prevents the two chief tools used in an attack to give control to the hackers. Protect against the execution of unauthorised keyloggers and remote control access programs, which open your networks to cybercriminals. In addition to network protection, Whitelisting solutions save money by reducing downtime, extending PC lifecycles, and reducing the volume of support tickets, all of which are after-effects of a malware attack on your network.<\/p>\n<p><strong>Date: Thursday 12th April<\/strong><\/p>\n<\/div>\n<div>\n<p><strong>Time: 10am BST<\/strong><br \/>\n<strong>Venue: Online<\/strong><\/p>\n<table style=\"background-color: #d30709; border: solid 1px #3a6f21; font-family: Arial, Helvetica, sans-serif; color: white; font-weight: bold; font-size: 18px; line-height: 20px;\" width=\"170\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"background-color: #d30709; border-top: solid 1px #F00; border-left: solid 1px #F00; border-right: solid 1px #8a0709; border-bottom: solid 1px #8a0709;\" align=\"center\"><a style=\"text-decoration: none; color: white; padding: 10px; font-size: 14px;\" href=\"http:\/\/bit.ly\/H3q8TX\" target=\"_blank\">Register Now<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>What is a Whitelisting Solution?\u00a0<\/strong><\/p>\n<p>Whitelisting technology is the opposite of blacklist technology; the list of entities, whether domain names, email addresses, or executable files, is a list of only what is allowed to penetrate a system. For example, a whitelist of domain names is a list of URLs that are authorized to display, despite any rules of an email spam blocker program.<\/p>\n<p>The most familiar example of a whitelist solution is email-based where users create a list of authorised email addresses from which they approve receiving messages, again despite the rules of an anti-spam program.<\/p>\n<p>One of the most important areas of whitelisting is application whitelisting. With application whitelisting only preapproved programs are allowed to\u00a0on a machine and all other programs that are not given the approval status are simply not allowed to run.<\/p>\n<p><strong>Register for our webinar and see the benefits of a simple and secure option for total system control, supplying greater security to your network, and greater peace of mind for administrators.<\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<div><a href=\"\/assets\/password_ae.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-48322\" title=\"password_ae\" src=\"\/assets\/password_ae.png\" alt=\"\" width=\"300\" height=\"233\" \/><\/a><\/div>\n<div>\n<p><a href=\"http:\/\/bit.ly\/H3q8TX\" target=\"_blank\">CLICK TO REGISTER TODAY<\/a> \u00a0for our webinar on Application Whitelisting, the ultimate safeguard against maleare.<\/p>\n<p>Attend our webinar and find out how Whitelisting solutions:<\/p>\n<ul>\n<li>provide protection against malware, allowing only pre-approved applications to run<\/li>\n<li>protect against zero-day and targeted attacks, designed to get around those blacklisting measures your typical anti-virus has in place<\/li>\n<li>improve employee productivity and workstation efficiency<\/li>\n<\/ul>\n<p>Find out how Whitelisting solutions prevents the two chief tools used in an attack to give control to the hackers. Protect against the execution of unauthorised keyloggers and remote control access programs, which open your networks to cybercriminals. In addition to network protection, Whitelisting solutions save money by reducing downtime, extending PC lifecycles, and reducing the volume of support tickets, all of which are after-effects of a malware attack on your network.<\/p>\n<p><strong>Date: Thursday 12th April<\/strong><\/p>\n<\/p><\/div>\n<div>\n<p><strong>Time: 10am BST<\/strong> <strong>Venue: Online<\/strong><\/p>\n<p> <a style=\"text-decoration: none; color: white; padding: 10px; font-size: 14px;\" href=\"http:\/\/bit.ly\/H3q8TX\" target=\"_blank\">Register Now<\/a> <\/p>\n<p>&nbsp;<\/p>\n<p><strong>What is a Whitelisting Solution?\u00a0<\/strong><\/p>\n<p>Whitelisting technology is the opposite of blacklist technology; the list of entities, whether domain names, email addresses, or executable files, is a list of only what is allowed to penetrate a system. For example, a whitelist of domain names is a list of URLs that are authorized to display, despite any rules of an email spam blocker program.<\/p>\n<p>The most familiar example of a whitelist solution is email-based where users create a <\/p>\n<div class=\"more\"><a href=\"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware\">Continue Reading&#8230;<\/a><\/div>\n","protected":false},"author":108,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-48310","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Webinar: Application Whitelisting: The ultimate safeguard against malware - Faronics<\/title>\n<meta name=\"description\" content=\"CLICK TO REGISTER TODAY \u00a0for our webinar on Application Whitelisting, the ultimate safeguard against maleare. Attend our webinar and find out how\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar: Application Whitelisting: The ultimate safeguard against malware\" \/>\n<meta property=\"og:description\" content=\"CLICK TO REGISTER TODAY \u00a0for our webinar on Application Whitelisting, the ultimate safeguard against maleare. Attend our webinar and find out how\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware\" \/>\n<meta property=\"og:site_name\" content=\"Faronics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/faronics\" \/>\n<meta property=\"article:modified_time\" content=\"2012-03-27T16:19:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.faronics.com\/assets\/password_ae.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@faronics\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware\",\"name\":\"Webinar: Application Whitelisting: The ultimate safeguard against malware - Faronics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#website\"},\"datePublished\":\"2012-03-27T14:33:11+00:00\",\"dateModified\":\"2012-03-27T16:19:38+00:00\",\"description\":\"CLICK TO REGISTER TODAY \u00a0for our webinar on Application Whitelisting, the ultimate safeguard against maleare. Attend our webinar and find out how\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware#breadcrumb\"},\"inLanguage\":\"en-UK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar: Application Whitelisting: The ultimate safeguard against malware\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware\\\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#website\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\",\"name\":\"Faronics\",\"description\":\"Simplifying Computer Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faronics.com\\\/en-uk?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-UK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#organization\",\"name\":\"Faronics\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-UK\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"width\":155,\"height\":44,\"caption\":\"Faronics\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/faronics\",\"https:\\\/\\\/x.com\\\/faronics\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Webinar: Application Whitelisting: The ultimate safeguard against malware - Faronics","description":"CLICK TO REGISTER TODAY \u00a0for our webinar on Application Whitelisting, the ultimate safeguard against maleare. Attend our webinar and find out how","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware","og_locale":"en_US","og_type":"article","og_title":"Webinar: Application Whitelisting: The ultimate safeguard against malware","og_description":"CLICK TO REGISTER TODAY \u00a0for our webinar on Application Whitelisting, the ultimate safeguard against maleare. Attend our webinar and find out how","og_url":"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware","og_site_name":"Faronics","article_publisher":"https:\/\/www.facebook.com\/faronics","article_modified_time":"2012-03-27T16:19:38+00:00","og_image":[{"url":"https:\/\/www.faronics.com\/assets\/password_ae.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@faronics","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware","url":"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware","name":"Webinar: Application Whitelisting: The ultimate safeguard against malware - Faronics","isPartOf":{"@id":"https:\/\/www.faronics.com\/en-uk#website"},"datePublished":"2012-03-27T14:33:11+00:00","dateModified":"2012-03-27T16:19:38+00:00","description":"CLICK TO REGISTER TODAY \u00a0for our webinar on Application Whitelisting, the ultimate safeguard against maleare. Attend our webinar and find out how","breadcrumb":{"@id":"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware#breadcrumb"},"inLanguage":"en-UK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.faronics.com\/en-uk"},{"@type":"ListItem","position":2,"name":"Webinar: Application Whitelisting: The ultimate safeguard against malware","item":"https:\/\/www.faronics.com\/en-uk\/webinar-application-whitelisting-the-ultimate-safeguard-against-malware\/"}]},{"@type":"WebSite","@id":"https:\/\/www.faronics.com\/en-uk#website","url":"https:\/\/www.faronics.com\/en-uk","name":"Faronics","description":"Simplifying Computer Management","publisher":{"@id":"https:\/\/www.faronics.com\/en-uk#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faronics.com\/en-uk?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-UK"},{"@type":"Organization","@id":"https:\/\/www.faronics.com\/en-uk#organization","name":"Faronics","url":"https:\/\/www.faronics.com\/en-uk","logo":{"@type":"ImageObject","inLanguage":"en-UK","@id":"https:\/\/www.faronics.com\/en-uk#\/schema\/logo\/image\/","url":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","contentUrl":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","width":155,"height":44,"caption":"Faronics"},"image":{"@id":"https:\/\/www.faronics.com\/en-uk#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/faronics","https:\/\/x.com\/faronics"]}]}},"_links":{"self":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/pages\/48310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/users\/108"}],"replies":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/comments?post=48310"}],"version-history":[{"count":0,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/pages\/48310\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/media?parent=48310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}