This white paper discusses three strategies to protect endpoint security from risky applications.