Implement sophisticated endpoint privilege management and allow or block applications based on specified rules.
Features and benefits:
Limit the chances of malware intrusions and advanced persistent threats (APTs) by blacklisting malicious executables
Allow only what you trust by leveraging application whitelisting
Simplify list management with application whitelists and blacklists built on rules like product, vendor, hash value, and executables with valid certificates.
Manage Gray listed applications as per requirements by choosing to execute the application control functionalities either in audit mode or strict mode.
Run business-critical applications with restricted privileges to prevent attacks based on privilege elevation or compromised credentials.