This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop itWatch
IT Security Talks Management I

No executable object, no attack: use all applications securely - what do you need?

calendar_today Tue, 15.06.2021, 10:15 - 10:30

event_available Digital

Action Video


Action description







Managed Security Services / Hosting



This action is part of the event IT Security Talks

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description


Ransomware, Solarwind, Exchange Server ... it always takes software or hardware that can be used as a springboard for an attack and then, of course, software that carries out the attack. Pure whitelisting of applications has proven to be very costly and not very practical - and does not allow control of the applications' little siblings: macros, embedded scripts, etc. In order to be able to securely protect oneself against attacks, one must also bring these small accessories under control.

It is therefore no longer sufficient to look only at the applications on the server and client. So what needs to be done to separate good from evil - or is it rather a question of intentional and unintentional? Since it is not only at the point of execution at start-up that checks must be made, but also the "influx" of executable objects that provide meaningful answers to wanted or not wanted, it is clear that the use of several components at different points in the IT environment makes sense. These different components add up to a complete solution to the problem of "secure application use".

These components of the complete solution, which could be called Next Generation Application Control (NGAC) (and is called CodePurITy at itWatch), provides an answer to the question "how does the secure use of applications work". It is presented in the article. The details of its use and the experience gained will follow in the article "Recognise, qualify and securely use all executable objects/applications everywhere: how does that work?

... read more

Language: German

Questions and Answers: Yes


show more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.