Sep 3 2009
CoreTrace, the pioneer of client-based application whitelisting technology, today announced that Tucson Orthopaedic Institute, one of the largest orthopaedic groups in the United States, has selected CoreTrace's award-winning BOUNCER solution for endpoint protection of its systems located throughout the Institute's eight centers. CoreTrace's BOUNCER solution will be replacing Tucson Orthopaedic Institute's previous blacklist-based antivirus software; the Institute wanted to take a more proactive approach to securing endpoints.
In addition to seeking out a solution that offered stronger antivirus support and protection from drive-by attacks and other malware on the Institute's over 400 desktops and laptops across multiple locations, the IT team wanted a solution that would prevent employees from downloading non-business applications on to their systems, even if they had administrative privileges. The end goal was increased security, improved productivity and lower overall cost.
"We can't afford interruptions to our business and downtime to our systems due to security issues. We are implementing a new Electronic Health Record System and felt the time was right to make the move to a more effective application whitelisting approach," said Jim Garrity, IT manager for Tucson Orthopaedic Institute. "We selected BOUNCER because it provided the broadest protection from different types of attack, while also giving us capabilities that antivirus solutions do not offer, like configuration control."
With CoreTrace's BOUNCER solution, Tucson Orthopaedic Institute will now be able to defeat malware and other exploits directly, limit user privileges and prevent end-users from altering the configuration of their systems. By simultaneously addressing each of these objectives, the Institute's application whitelisting approach promises to be effective and decrease administrative overhead. rationally and pragmatically transition to application whitelisting. We welcome Tucson Orthopaedic Institute to our family of customers and look forward to helping them to secure their environment and lower their costs." malware attacks (e.g., rootkits, memory exploits), while allowing users to safely install new applications and have them automatically added to the whitelist without requiring IT involvement.