Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Certain types of software can open significant security holes in the enterprise network. Controlling what software is installed on end-user devices is a critical step in closing these holes. Include in your organization’s Software Installation Policy:

•    What software is supported, what is not.
•    How to make software requests.
•    Procedures around software installation.
•    Details about periodic audits.

A critical weapon in your security management arsenal is to control what software can be installed on end-user devices. Apply this Software Installation Policy to identify standard software titles and clearly communicate what is prohibited.

Related Content

Hide Details

Search Code: 28185
Published: October 8, 2010
Last Revised: October 8, 2010

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.