Gartner Research

Protecting Endpoints From Malware Using Application Whitelisting, Isolation and Privilege Management

Published: 06 July 2016

ID: G00302931

Analyst(s): Mario de Boer


Various solutions protect endpoints against sophisticated malware by controlling applications. To help security architects understand the pros and cons of using application control for malware protection, this document assesses three technologies and their impact on users and IT operations.

Table Of Contents


  • Application Control Versus Blacklisting for Malware Protection
  • Objectives of Application Control
  • Application Control Concepts
  • Categorizing Applications
    • Known Good Files
    • Known Bad Files
    • Gray Files
  • Limitations of Application Control
    • Known Good Files Can Become Malicious
    • Application Control Does Not Prevent Changes to Configuration Settings
    • Application Control Depends on Successful Policy and Exception Management
  • Postexecution Application Control Through Isolation, Monitoring and Journaling
  • User Privileges Versus Application Privileges
  • Application Control Solutions
  • The Impact of Application Control on Users and IT Operations
    • Limiting the Impact on Users
    • Limiting the Impact on IT Operations
    • Making Application Control Work
  • Future Developments
  • Strengths
  • Weaknesses


The Details

Gartner Recommended Reading

©2021 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.