Whitelisting for Endpoint Defense ◾ 13
◾ Whitelisting works best in environments where end users are not normally allowed to install
applications and where there is a high degree of standardization among endpoints.
◾ Requirement gathering and development is a must when evaluating whitelisting solutions.
About the Author
Rob Shein, CISSP, is a cyber security architect for HP. During the past 30 years—starting with
writing his first program at age 11—Rob has focused almost exclusively on security. His role at
HP has spanned the utility, outsourcing, financial, government, and manufacturing sectors in
the Americas and Asia. Rob’s areas of specialization range from policy work to penetration test-
ing, implementation/architecture, C2 systems, pure ...