Today’s applications no longer can be monitored and controlled by port and protocol at the firewall. Applications are used on both your corporate provided workstations and on employee owned devices used in your environment. These products allow you to regain control of applications by name and by function, blocking those that you do not want on your network, regardless of their port or protocol.
Bit9 + Carbon Black provides the industry’s more comprehensive and effective application control by monitoring and recording all activity on the endpoints and servers to detect and stop cyber threats that evade traditional defenses. Three policy enforcement levels allow you to be notified about suspect software, require your users to confirm they want to run an application that Bit9 finds suspicious or allow you to block any untrusted software until IT formally reviews and approves it. This last option is also known as whitelisting for approved products.
Port numbers, protocols and IP addresses tell you nothing about what is actually happening on your network. Palo Alto Networks next generation firewalls provide detailed information about the applications, users and content traversing your network; empowering you to quickly determine the risks they pose and to quickly respond. The Application Control Center (ACC) gives an interactive, graphical summary of the applications, users, URLs, threats and content traversing your network.
Reduce your attack exposure by preventing unwanted and unknown applications from executing on your endpoints. Enhance your defenses with flexible, easily managed policies, whitelisting and blacklisting capabilities combined with a global, cloud-powered application database. Endpoint Application Control from Trend Micro helps you safeguard your data and machines against unauthorized access and user