According to the Australian Cyber Security Centre
Improve security with less resources
- Simple Deployment and Maintenance
- Realtime File Alerting and Reporting
- Prevent Ransomware and Targeted Cyber Intrusions
- Compliant with numerous compliance standards including the Essential 8 Mitigation Strategies

Simplistic Workflows
The largest challenge organisations face when implementing Application Whitelisting is the creation and maintenance of the whitelist itself. Airlock contains simplistic workflows which enable organisations to easily create and maintain a unique hash based whitelist for their organisation. This provides a high level of security, as the whitelist is created and maintained locally without external trust.

Meaningful Metrics
Airlock reports and dashboards have been designed to include actionable metrics and logs which humans can understand.

Visibility Up Close
Airlock builds a centralised repository of all executable files handled on your network. This includes comprehensive file metadata and execution history.

ISM Compliant
Airlock has been designed to exceed the security requirements of Application Whitelisting as defined in the Australian Signals Directorate’s Information Security Manual (ISM). Hash based whitelists, role based separation and log retention have been designed to enable compliance with the ISM.
Fill in the form below to get instant access to our product demonstration video
We hate spam and promise to treat your email details responsibly.