Airlock Description

Simple, Secure, and Effective Execution Control. Airlock Execution and Allowlisting (formerly Application Whitelisting) can stop targeted attacks. Application allowlisting - Minimum hassle Airlock makes execution control simple. It is simple to use. Airlock was specifically designed to allow application allowlisting at large scales in complex and changing enterprise environments. Rapid. Airlock makes it easy to create, deploy, and manage application allowlists quickly. This allows organizations to become more secure and compliant sooner. Complete coverage. Airlock offers the protection you need. Binaries + Scripts. Airlock supports execution control for all binary files (executables / dlls), including scripts (PowerShell. VBScript. MSI. JavaScript. Batch Files & HTML executables). File Reputation. ReversingLabs partners with Airlock to help identify files that are safe to add on to the allowlist. This service will also identify files automatically

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Airlock Digital
Headquarters:
Australia
Website:
www.airlockdigital.com

Media

Airlock Screenshot 1
Recommended Products
Convert CentOS to Red Hat Enterprise Linux on Azure Icon
Convert CentOS to Red Hat Enterprise Linux on Azure

Streamline your CentOS migration journey by moving workloads to Red Hat Enterprise Linux on Azure.

CentOS Linux is experiencing End of Life on June 30th, leading to potential gaps in security. With Red Hat Enterprise Linux on Azure, IT Teams can streamline the migration of CentOS Linux workloads knowing they don’t have to compromise on security, scalability, or reliability, and can simplify management. Securely accelerate innovation and unlock a competitive edge with an enterprise-grade Linux on Azure.

Product Details

Platforms
SaaS

Airlock Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting