Download the authoritative guide: Cloud Computing 2018: Using the Cloud to Transform Your Business
No single technology guarantees security, however application whitelisting covers situations not addressed by firewalls or anti-virus utilities. This paper from Faronics focuses on how application whitelisting can be effectively used as an important layer in your security scenario. It examines other security layers as well, and demonstrates how whitelisting compliments and augments existing defenses. It also discusses the limitations and difficulties inherent in various existing defenses.