On the application security front, there are options that provide more flexibility than simply allowing or disallowing applications to run. We recently reviewed BeyondTrust Privilege Manager, which lets administrators elevate user rights as needed; it doesn't, however, eliminate the malware risk.
Sanctuary deals with the threat of malware from untrusted sources, such as rogue Internet applications, by referring to trusted lists of application groups. It uses the SHA-1 hashing algorithm to create "signatures" of allowed applications. Only those apps that are members of an allowed group can run.
While similar functionality is available to Windows administrators using Active Directory Group Policy, it's much easier to manage with a tool like Sanctuary. The Group Policy editor isn't the best place to manage application file names and hashes, while Sanctuary was designed specifically for this purpose. It also computes hashes for you, eliminating an extra step.
The whitelist database is built from scans of Sanctuary client computers, specified by IT. The logical approach is to dedicate systems with up-to-date operating system and application versions to serve as reference machines. Scans are initiated remotely from the administrative console, and results are compared against a reference database of known file definitions and predefined file groups. Allowing or denying permission for a subset of users to run a program then becomes a function of associating the file group with an object in your enterprise directory. We tested this feature by denying the use of Mozilla Firefox for an Active Directory user group.