Today's standard in network and endpoint security are increasingly complex defense strategies. No one really understands what modern security products really do and why they do it.
With application whitelisting, seculution goes the entirely opposite way. Anything that is not on the whitelist cannot be technically executed. The very fact that it is not necessary to know which things are dangerous makes application whitelisting more scalable and powerful than security solutions that rely on deep learning, heuristics or signature-based detection.
David Hogue
Technical Director NSA Cybersecurity Threat Operations Center
seculution blocks all ransomware threats known worldwide. And all this without behavioral analyses or puzzling marketing promises. Anything that is not on the whitelist cannot be started. Not even with domain admin privileges.
Due to the simple and superior principle, even today still unknown ransomware and boot record attacks are reliably stopped. This fact alone makes seculution Application-Whitelisting the most powerful anti-ransomware technology ever.
Do not allow attackers to execute their code in the first place: seculution simply blocks the exploits and mechanisms used to spread malware, steal access data and circumvent heuristics. This means that hacker and zero-day attacks no longer have a chance of being executed on your computer network.
Bernd Zimmer
IT Department, Lukas Hospital Neuss
The basis for the protection of any corporate network.
Details...
Whitelisting has never been so easy.
Details...
Secure even without a connection to the server.
Details...
Integrate new hardware during operation without compromising security.
Details...
Your shortcut to everyday life. A specially authorised user or a group of users who can run unknown software.
Automatically import defined sources into the whitelist.
Details...
Use Application Control over your familiar MS-Active-Directory objects.
Who is secured, who is not?s...
These additional modules extend the seculution protection sensibly and offer even more comfort at the same time.
Do you know which USB devices are used in your network? Simply define with the device whitelist which device in your network can be used by which user, at which endpoints.
Enable users to encrypt their information on USB storage devices (AES256) and protect it with a personal password. Data Leakage Prevention can be implemented effectively and without additional software.
Especially so-called critical infrastructures need modern and highly effective protection. Whether energy suppliers such as municipal utilities, hospitals or power plant operators, our customers rely on the protection that only seculution can offer.
Protect all systems that can no longer keep up with current patch policies because they are no longer supported or the hardware no longer provides the required performance.
seculution prevents the execution or modification of any software.
Systems that provide highly specialized functionality are extremely vulnerable. ATMs, for example. Successful attacks on the used and once outdated operating systems are not even possible with seculution. Any change to the original state is impossible.
Operating System | VERSION | |
---|---|---|
Windows | All Versions ≥ XP SP3* | All Server Versions ≥ Windows 2003*
Citrix compatibel |
Hyper Visor | RESSOURCES | |
All Hyper Visor Platforms are supported | 4 CPUs (Recommended: 8 CPUs) 4 GB RAM (Recommended: 8 GB RAM) 8 GB hard disk space |
* For old MS Windows versions (Windows NT4, Windows 2000, and Windows XP < SP3), a compatible, feature-limited version of the Agent can be provided on request.