Best Application Control Software in Asia

Find and compare the best Application Control software in Asia in 2024

Use the comparison tool below to compare the top Application Control software in Asia on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Heimdal Endpoint Detection and Response (EDR) Reviews
    Top Pick
    See Software
    Learn More
    Empower your sysadmins and users alike with App Control. Choose from multiple options like file path, publisher, certificate, vendor name, software name, MD5, and more to effortlessly allow or block application execution. Take control of your system, your way.
  • 2
    Zscaler Reviews
    Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
  • 3
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 4
    baramundi Management Suite Reviews

    baramundi Management Suite

    baramundi Software USA

    $5000.00/one-time
    Unified Endpoint Management system that is modular, scalable, and highly affordable for IT management, security, and workflow automation. Modules can be accessed from one interface, a single database. You can choose from any of the 18 modules available now and add more as you need for OS Install & Cloning and Patch Management, Vulnerability Management and MDM.
  • 5
    Securden Endpoint Privilege Manager Reviews
    Identify and populate all local administrator accounts on endpoints across your IT network. Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission based system for smooth employee experience. Discover and add applications that require elevated privileges to run automatically. Whitelist and blacklist applications using comprehensive application control policies. Enforce principle of least privilege and principle of zero-trust across the organization. Comply with industry regulations with complete audit trails and record all activities. Track application usage across the organization using comprehensive reports and gain insights that help you with creating policies for smoother experience.
  • 6
    Securden Unified PAM Reviews
    Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards.
  • 7
    Delinea Privilege Manager Reviews
    Privilege Manager is the most complete endpoint privilege elevation and control solution, and it operates at cloud speed. By removing administrative rights from local endpoints and implementing policies-based controls on applications, you can prevent malware exploiting these applications. Privilege Manager prevents malware attacks and does not cause any friction for end users. This slows down productivity. Privilege Manager is available on-premises or in the cloud. Fast-growing companies and teams can manage hundreds to thousands of machines using Privilege Manager. Privilege Manager makes it easier than ever for executives and auditors to manage endpoints. It includes built-in application control, real time threat intelligence, and actionable reports.
  • 8
    Heimdal Application Control Reviews
    Heimdal Application Control offers a new approach to integrative app management and user rights curation. App Control is modular and easy to set-up. It allows the system administrator to create all encompassing rule-based frameworks and streamline auto-dismissal and auto-approval flows. It also enforces individual rights per Active Directory group. The uniqueness of the tool comes from its ability, in perfect coordination with a (PAM), Privileged Access Management solution. This allows for the user to have granular oversight over software inventories and hardware assets.
  • 9
    Check Point Application Control Reviews
    Application Control offers the industry's strongest identity and application security to all organizations. Application Control is integrated into the Check Point Next Generation Firewalls. This allows businesses to create granular policies based upon users or groups to block, limit, or identify the use of applications and widgets. Applications can be classified into different categories based on various criteria, such as their type, security risk level and resource usage. There are also productivity implications. Granular control over social networks, applications, as well as application features, allows you to identify, allow, block or limit usage. The world's largest app library is used to group apps into categories, simplifying policy creation and protecting against malware and threats. Next Generation Firewalls integrates with Next Generation Firewalls to simplify security controls and reduce costs. Only authorized users and devices have access to your protected assets.
  • 10
    Trellix Application Control Reviews
    Advanced persistent threats (APTs), which can control servers, points, and fixed devices via remote attacks or social engineering, make it more difficult to protect your business. Trellix Application Control is a tool that helps you outsmart cybercriminals. It keeps your business safe and productive. You can ensure that only trusted apps run on desktops, servers, and devices. Trellix Application Control offers organizations the ability to increase their whitelisting strategy to prevent threats. Users are demanding more flexibility in using applications in their cloud-enabled social and business worlds. Trellix Application Control gives IT multiple options to allow users to install unknown applications. These include user notifications and user self-approvals. By blocking execution of unauthorized apps, you can prevent zero-day attacks and APT attacks. To quickly identify and fix compliance and security problems in your environment, use inventory search and predefined reports.
  • 11
    PC Matic Reviews

    PC Matic

    PC Matic

    $50 per year
    PC Matic Pro's Application Whitelisting is a critical layer of cyber-protection. It sits on top of other endpoint security products. Zero trust whitelisting solutions stop hacking and other cyber-attacks. Stop all malware, ransomware, or malicious scripts from being executed. Our whitelist cybersecurity solution will protect your network, users, and business data. PC Matic Pro is a long-overdue shift in cybersecurity industry towards absolute prevention. The threats to critical infrastructure, industry, government, and all levels of government today demand nothing less. PC Matic Pro offers a patented default deny security layer at the device. This prevents all unknown executions and does not create headaches for IT. Contrary to traditional security solutions, customer infected are not required to strengthen whitelist architecture. Local overrides can also be added after prevention, with a focus upon accuracy and no concern for responding to an active infection.
  • 12
    Ivanti Application Control Reviews
    Application Control combines privilege management with dynamic allowed and denied list to prevent unauthorized code execution. IT does not have to manage large lists manually and it does not constrain users. Automated requests and approvals through helpdesk systems reduce the IT staff's workload while providing users with a simplified experience. Application Control allows you to manage user privileges and policy at a granular level. It also allows for optional self-elevation in the event of exceptions. With seamless app access, your users will have quick access to the information they need. This is possible thanks to context-aware, granular policies. To ensure that only trusted and known applications are allowed to execute on a system, create flexible preventive policies. Automated requests for emergency privilege elevation and application access via integrated IT helpdesk systems.
  • 13
    DriveLock Reviews
    DriveLock makes it easy to protect your business data, IT systems and endpoints. DriveLock makes it easier than you might think. We share our knowledge and use the latest technologies. You don't need to worry about data security throughout its lifecycle or across all your endpoints. DriveLock Zero Trust Platform - Instead of closing gaps in an environment with independent and individual security silos, this model prevents access to all data. DriveLock’s centralized policies only allow access to data and applications needed by individual employees and endpoints, in line with the maxim “never trust, never verify”.
  • 14
    AhnLab TrusGuard Reviews
    A thorough market assessment has recognized the NGFW TrusGuard for its technology, performance, and stability. The business environment is protected by the firewall, IPS and application control, VPN, C&C as well as Anti-Virus/AntiSpam and DLP. TrusGuard offers a full range of models, from low-end to high-end. Protects high-performance networks. Optimized for high-performance multicore environments, this optimizer is capable of handling increasing network traffic. Network stability. The 3-step defense protects network resources (such websites, databases servers, applications servers and client machines) against unknown network attacks. Protects IPv6 network environments. Complete support for IPv6 networks. Reduces total cost-of-operation (TCO). Cost savings compared to integrating multiple products. Reduces operational and labor costs associated managing multiple security solutions. This increases productivity and network efficiency.
  • 15
    ManageEngine Application Control Plus Reviews
    Application Control Plus is an enterprise solution that combines application control and privilege management features to strengthen endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses.
  • 16
    VMware Carbon Black App Control Reviews
    To prevent unwanted changes and ensure compliance with regulatory mandates, lock down servers and critical systems to protect them. Protect corporate systems and protect legacy and new systems from unwanted change. VMware Carbon Black®, App Control™, is one of the most reliable and scalable applications control solutions available. Unify multiple endpoint security capabilities and work faster and more efficiently with one cloud-native platform. Stop ransomware, malware, zero-day, and other malicious attacks. File-integrity monitoring, device control, and memory protection can prevent unauthorized changes. To assess risk and protect the system, monitor critical activity. Secure EOL systems using powerful change-control policies and application control policies. Management overhead is kept low with out-of-the box templates.
  • 17
    PolicyPak Reviews
    Organizations with different security and management requirements can choose the right edition through the PolicyPak Platform. Users can access their desktops from anywhere: at work, at home, on the road, via a kiosk or virtually. These environments present a challenge in managing and securing them. Not all management systems are designed for modern management scenarios. PolicyPak offers solutions that modernize your existing infrastructure and extend its power. PolicyPak can be used with Active Directory to simplify the management and security of Active Directory-connected computers. Microsoft Group Policy is a powerful technology that you can rely on every day. It needs to be re-engineered to meet the modern enterprise's reporting, security, and automation requirements.
  • 18
    WatchGuard Application Control Reviews
    Based on the user's job function, department, and time of day, you can allow, block, or limit access to applications. It's now easier than ever to determine who, what, where, why, and how applications are used in your network. WatchGuard Application Control is a part of the WatchGuard Basic Security Suite. The Basic Security Suite includes all of the traditional network security services that are typical to a UTM appliance, including Gateway AntiVirus, Intrusion Prevention Service, URL filtering and URL filtering. It also includes reputation lookup, spam blocking, spam blocking, and application control. It also includes our centralized management capabilities and network visibility capabilities as well as our standard 24-hour support.
  • 19
    Airlock Digital Reviews
    Airlock Allowlisting & Execution Control can stop targeted attacks. Airlock was specifically designed to allow application allowlisting at large scale in complex and changing enterprise environments. Airlock makes it easy to create, deploy, and manage application allowlists quickly, which allows organizations to become compliant and secure sooner. Airlock supports execution control for all binary files (executables / dlls), including scripts (PowerShell and VBScript, MSI JavaScript, Batch Files & HTML executables). Airlock partners with ReversingLabs in order to determine which files can be added to the allowlist. This service will also identify suspicious and malicious files in your environment. Airlock does not compromise security for efficiency. Airlock enforces allowlisting to ensure compliance with all security standards. Airlock is a secure, efficient, and easy-to-use execution control solution for businesses.
  • 20
    BeyondTrust Endpoint Privilege Management Reviews
    Reduce unnecessary privileges and give Windows, Mac, Unix and Linux access without affecting productivity. Our experience with more than 50 million endpoints has allowed us to develop a rapid deployment process. BeyondTrust is available on-premise and in the cloud. It allows you to quickly and efficiently remove admin rights without affecting user productivity or increasing service desk tickets. External attackers and malicious insiders are high-value targets for Unix and Linux systems. The same applies to networked devices such as IoT and ICS, as well. An attacker can gain root or other privileged credentials to easily fly under the radar and gain access to sensitive systems and data. BeyondTrust Privilege Manager for Unix & Linux provides an enterprise-class, high-standard privilege management solution that assists IT organizations in achieving compliance.
  • Previous
  • You're on page 1
  • Next