Application whitelisting has been touted as the definitive solution to many of the shortcomings of signature based malware solutions. While this may be true- introducing the technology to any environment without careful planning and foresight can prove disastrous. Evaluate the gaps between vendor marketing materials and real-world application whitelisting experiences and research to provide an overview of the technology. Implementation guidance covering potential technical and non-technical land mines- key success factors and operational considerations will provide decision materials necessary to determine if this silver bullet belongs in the arsenal.