Workflow Based Allowlisting

Airlock enables you to easily create and manage secure allowlists (formerly application whitelists) in dynamically changing computing environments.

Unlike signature based file blocking (blocklisting) such as antivirus, Airlock only allows files it has been instructed to trust, to run. If the file is not in the allowlist it cannot run, regardless if a file is known good, bad or indifferent. This proactively prevents malicious code from running on your system, before any damage occurs. Airlock manages this trust through an intuitive workflow, rather than implementing large and hard to manage ‘firewall style’ rulesets.

 

Simple Deployment, Operation and Maintenance

Until now, Allowlisting (commonly referred to as Application Control or Application Whitelisting) has been difficult to deploy and maintain within an organisation. Airlock has been developed from the ground up by security professionals to solve real world problems with Allowlisting.

Airlock incorporates proven and effective workflows, designed for ease of use in dynamically changing enterprise environments. Allowlisting with Airlock is a simple, repeatable process.

 

Realtime Reporting, Detection and Response

Airlock provides centralised visibility over all files within in an organisation. Discover when a file was first seen in your environment, where it came from and how it was executed.

Files can be centrally queried, perfect for security operations teams.

 

Lightweight

Many security offerings typically rely on large endpoint agents and the delivery of bulky virus definitions to function. Often these definitions can be upwards of two hundred megabytes in size for each endpoint.

The Airlock Enforcement Agent is lean, with small policy sizes and minimal impact on endpoint resources across Windows, Linux and macOS. Trust definitions are strictly within control of the administrator, with no regular agent definitions provided by a third party, this also enables the solution to operate entirely without an internet connection if required.

 

Prevent Ransomware and Targeted Cyber Intrusions

Modern attacks involve the modification of files, or the creation of unique malware to avoid detection by traditional security software. “99% of malware hashes are seen for only 58 seconds or less. In fact, most malware was seen only once. This reflects how quickly hackers are modifying their code to avoid detection.”1

As each customer makes decisions regarding what files they trust in-house, each deployment is unique. This prevents cyber-criminals from testing their attacks or modifying their code to avoid detection

Airlock Meet Security Compliance

Meet Security Compliance

Allowlisting is recognised by Government agencies around the world as a leading security strategy to prevent targeted cyber intrusions.
It also assists compliance with PCI-DSS2 and HIPAA3.

Airlock exceeds compliance requirements, even when placed against the strictest standards; the Australian Signals Directorate Strategies to Mitigate Cyber Security Incidents4 and the NIST Guide to Application Whitelisting5.

Watch a Product Demonstration Now

Fill in your contact details and we will send a product demonstration video directly to your inbox.

 

Airlock Watch a Product Demonstration Now

 

Securing companies around the globe