Application Whitelisting

Next Generation Multilayer Thread Protection Intrusion Prevention Machine Learning Intelligence Antivirus Solution

Highly effective due to low complexity

Today's standards in network and endpoint security involve increasingly complex defence strategies. No one really understands what modern security products really do and why they do it.

With application whitelisting, Seculution goes the opposite way. Anything not on the whitelist cannot be technically executed. The fact that it is not necessary to know which things are dangerous makes application whitelisting more scalable and powerful than security solutions that rely on deep learning, heuristics or signature-based detection.

"All successful attacks of the past 24 months would have been prevented by simple measures such as application whitelisting."
David Hogue
Technical Director NSA Cybersecurity Threat Operations Center

Exploit Prevention

Seculution blocks all ransomware threats known worldwide. All of this without behavioural analysis or confused marketing promises. Anything that is not on the whitelist cannot be started. Not even with domain admin privileges.

Due to the simple and superior principle, even today unknown ransomware and boot record attacks are reliably stopped. This fact alone makes Seculution Application-Whitelisting the most powerful anti-ransomware technology ever.

We prevent attackers from executing their code in the first place: Seculution simply blocks the exploits and mechanisms used to spread malware, steal access data and circumvent heuristics. This means that hacker and zero-day attacks no longer have a chance of being executed on your computer network.

Guaranteed!

Features

The Seculution Basis package includes the following features:

Application Whitelist Seculution Cloud Offline Mode Selective Learn Mode
The basis for the protection of any corporate network. Whitelisting has never been so easy
Secure even without a connection to the server.
Integrate new hardware during operation without compromising security.
Permanent Learn User Auto-Import Active-Directory Integration Integrated Agent Deployment
Your shortcut to everyday life. A specially authorised user or a group of users who can run unknown software. Automatically import defined sources into the whitelist. Use Application Control over your familiar MS-Active-Directory objects. Who is secured, who is not?


Exploit the full potential!

Additional modules extend the seculution protection sensibly and offer greater comfort at the same time.

Device Whitelist

Do you know which USB devices are used in your network?

Simply define with the device whitelist which device in your network can be used by which user, at which endpoints.

Device-Encryption

Enable users to encrypt their information on USB storage devices (AES256) and protect it with a personal password. Data Leakage Prevention can be implemented effectively and without additional software.