Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Application-level security attacks, such as file system corruption, registry corruption, spyware, and keylogging pose a serious threat to mission critical business operations. Arellia Application Control Solution™ (ACS) software helps you manage this risk by enabling you to control the software applications in your environment.

With ACS you can perform the following:

  • Create policies to automatically inventory software packages or systems and add authorized applications to a whitelist. 
     
  • Create policies to whitelist trusted file owners or digital certificates.
     
  • Elevate privileges for standard users.
     
  • Implement the principle of least privilege, that is require each subject in a system is granted the most restrictive set of privileges necessary for them to perform their tasks, to limit damage that can result from accident, error, or unauthorized use. (For details about how to protect your system from malicious behavior, go to Restrict an Application's Process Rights.) 

...

Getting Started Scenarios

For sample scenarios that highlight the functionality and use of this solution, go to Getting Started and Standard Use Cases.To find out what you can do with ACS, go to Introduction to Application Control Solution (ACS) 8.0.