Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Network Security, Security Strategy, Plan, Budget, Incident Response, TDR, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Unauthorized software rampant

Share

In a survey of 250 IT managers, 77 percent of respondents said they had a policy prohibiting unauthorized downloads. Yet 37 percent said they found unauthorized software running on more than half of endpoints in their enterprise, Tom Murphy, chief strategist at application whitelisting vendor Bit9 told SCMagazineUS.com. In addition, only 34 percent reported feeling confident that they will be able to remove unauthorized software this year. “[Respondents] feel like they are out of control, with regard to prohibiting and enforcing policies,” Murphy said. — AM

Unauthorized software rampant

In a survey of 250 IT managers, 77 percent of respondents said they had a policy prohibiting unauthorized downloads. Yet 37 percent said they found unauthorized software running on more than half of endpoints in their enterprise, Tom Murphy, chief strategist at application whitelisting vendor Bit9 told SCMagazineUS.com. In addition, only 34 percent reported feeling confident that they will be able to remove unauthorized software this year. "[Respondents] feel like they are out of control, with regard to prohibiting and enforcing policies," Murphy said. — AM

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.