According to the Australian Cyber Security Centre
Simple Deployment and Maintenance
Realtime File Alerting and Reporting
Prevent Ransomware and Targeted Cyber Intrusions
Compliant with numerous compliance standards including the Essential 8 Mitigation Strategies
The largest challenge organisations face when implementing Application Whitelisting is the creation and maintenance of the whitelist itself. Airlock contains simplistic workflows which enable organisations to easily create and maintain a unique hash based whitelist for their organisation. This provides a high level of security, as the whitelist is created and maintained locally without external trust.
Airlock reports and dashboards have been designed to include actionable metrics and logs which humans can understand.
Airlock builds a centralised repository of all executable files handled on your network. This includes comprehensive file metadata and execution history.
Airlock has been designed to exceed the security requirements of Application Whitelisting as defined in the Australian Signals Directorate’s Information Security Manual (ISM). Hash based whitelists, role based separation and log retention have been designed to enable compliance with the ISM.