(1) Security Objectives' Pass The Hash (PTH) solution goes beyond traditional signature-based malware detection by auditing systems to identify all running code and verify that programs have not been modified. (2) PTH reliably identifies what software is present without needing to reveal any internal data. (3) Whitelisting known safe software is more effective than blacklisting malware, as blacklisting is reactive and cannot keep up with new threats, while whitelisting enforces an organization's approved software policy.