Implement sophisticated endpoint privilege management and allow or block applications based on specified rules.

Features and benefits

  • Malware prevention: Limit the chances of malware intrusions and advanced persistent threats (APTs) by blacklisting malicious executables
  • Trust-centric approach: Allow only what you trust by leveraging application whitelisting
  • Rule-based list building: Simplify list management with application whitelists and blacklists built on rules like product, vendor, hash value, and executables with valid certificates.
  • Flexible customizations: Manage Gray listed applications as per requirements by choosing to execute the application control functionalities either in audit mode or strict mode.
  • Endpoint privilege management: Run business-critical applications with restricted privileges to prevent attacks based on privilege elevation or compromised credentials.