A computing paradigm based on the exchange and execution of arbitrary code is inherently risky.Yet, that’s pretty much the foundation of what we do today with personal computers. Consider that this model is the primary reason we pay billions of dollars to AV vendors to scan our machines for known malicious executable code. Consider that today most malware today is web-based – malicious executable code downloaded from the web onto the end-user’s machine and executed. In most cases, because the user was tricked into doing so. Sure, some baseline of local executables are needed for the OS and perhaps some personal productivity applications that require offline access. I can use whitelisting to control these. But do we really need the ability to download and install arbitrary executables for new types of functionality and services on our desktop?
Read Complimentary Relevant Research
Cloud Computing Primer for 2017
Cloud has evolved from a disruption to an expected approach to traditional as well as next-generation IT. Our research helps IT leaders,...
View Relevant Webinars
The Need for Speed: Ensuring Application Performance in the Cloud and Mobile Age
Enterprise networks NOW need to reach a larger and more geographically dispersed audience often using mobile devices. As direct control...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.