Airlock Application Allowlisting Solution
Why Application Whitelisting Is the #1 Most Effective Security Strategy
According to the Australian Cyber Security Centre
Discover How Airlock Makes Application Whitelisting Easier
-
Simple Deployment and Maintenance
-
Realtime File Alerting and Reporting
-
Prevent Ransomware and Targeted Cyber Intrusions
-
Compliant with numerous compliance standards including the Essential 8 Mitigation Strategies
"Whitelisting is foundational for comprehensive information security protection" - Gartner
"A combination of digital signature/publisher and cryptographic hash techniques generally provides the most accurate and comprehensive application whitelisting capability" - NIST guide
Simplistic Workflows
The largest challenge organisations face when implementing Application Whitelisting is the creation and maintenance of the whitelist itself. Airlock contains simplistic workflows which enable organisations to easily create and maintain a unique hash based whitelist for their organisation. This provides a high level of security, as the whitelist is created and maintained locally without external trust.
Meaningful Metrics
Airlock reports and dashboards have been designed to include actionable metrics and logs which humans can understand.
Visibility Up Close
Airlock builds a centralised repository of all executable files handled on your network. This includes comprehensive file metadata and execution history.
ISM Compliant
Airlock has been designed to exceed the security requirements of Application Whitelisting as defined in the Australian Signals Directorate’s Information Security Manual (ISM). Hash based whitelists, role based separation and log retention have been designed to enable compliance with the ISM.
Fill in the form to get instant access to our product demonstration video