Until now, Allowlisting (commonly referred to as Application Control or Application Whitelisting) has been difficult to deploy and maintain within an organisation. Airlock has been developed from the ground up by security professionals to solve real world problems with Allowlisting.
Airlock incorporates proven and effective workflows, designed for ease of use in dynamically changing enterprise environments. Allowlisting with Airlock is a simple, repeatable process.
Airlock provides centralised visibility over all files within in an organisation. Discover when a file was first seen in your environment, where it came from and how it was executed.
Files can be centrally queried, perfect for security operations teams.
Many security offerings typically rely on large endpoint agents and the delivery of bulky virus definitions to function. Often these definitions can be upwards of two hundred megabytes in size for each endpoint.
The Airlock Enforcement Agent is lean, with small policy sizes and minimal impact on endpoint resources across Windows, Linux and macOS. Trust definitions are strictly within control of the administrator, with no regular agent definitions provided by a third party, this also enables the solution to operate entirely without an internet connection if required.
Modern attacks involve the modification of files, or the creation of unique malware to avoid detection by traditional security software. “99% of malware hashes are seen for only 58 seconds or less. In fact, most malware was seen only once. This reflects how quickly hackers are modifying their code to avoid detection.”1
As each customer makes decisions regarding what files they trust in-house, each deployment is unique. This prevents cyber-criminals from testing their attacks or modifying their code to avoid detection
Allowlisting is recognised by Government agencies around the world as a leading security strategy to prevent targeted cyber intrusions.It also assists compliance with PCI-DSS2 and HIPAA3.
Airlock exceeds compliance requirements, even when placed against the strictest standards; the Australian Signals Directorate Strategies to Mitigate Cyber Security Incidents4 and the NIST Guide to Application Whitelisting5.
Securing companies around the globe
Fill in your contact details and we will send a product demonstration video directly to your inbox.