The foundation for Application Control. Check the use of DLLs, Java code and USB devices using hashes in addition to executable files. SecuLution achieves an incomparably higher level of security than conventional products by using this approach and consistently applying whitelisting.
See also SecuLution Antivirus.
In addition to checking executable code, the use of USB devices can also be verified. Forget the cumbersome management of USB ports and their clearance. Instead, simply define which device in your network can be used by which user and at which endpoints.
Even without a network connection, SecuLution protects mobile users and secures endpoints without connecting to the corporate network. Hashes stored in a local encrypted cache are used as an offline backup. Your endpoints always stay protected, no matter where they are.
To avoid the hassle of adding each update separately to the SecuLution Whitelist, certain paths, such as your WSUS content folder or software repository, can be defined as trusted sources. As soon as new software is available, SecuLution recognises it and adds it to the whitelist without your intervention.
SecuLution integrates perfectly into your network, you can even use Active Directory objects to define a user or group of administrative users that allow you to run applications that are not yet on the whitelist. Simply run the new or blocked application as a learning user, the software will be included in the whitelist and automatically classified by your approval.
The functionality of the Permanent Learn User should of course only be available to administrators.
Give users the ability to encrypt (AES256) their business information on mass storage devices with SecuLution and protect it with a personal password. Even in the event of a data volume loss, the information is safe from third-party access.
Data Leakage Prevention can be realised effectively and without additional software.
No one can overlook every application in their network, let alone make a statement about whether they want to include all applications on their Application Whitelist. So that you don't have to check thousands of unknown applications individually, we provide you with a service that allows you to check all unknown applications for authenticity with just two clicks.
Start the distribution of the SecuLution Agent with two clicks on selected endpoints. Our software distribution takes care of the rest for you.
Maintain an overview of the secured hosts on the network without the need for a comprehensive software distribution solution.
Doubts about false positives such as Antivirus products often cause because of their mode of operation are now a thing of the past. Thanks to hash checking against the central whitelist in your corporate network.
Either an application is uniquely identifiable by hash or it cannot be executed. It's that simple.
Even if a new wave of Ransomware attacks networks worldwide and other Antivirus solutions are powerless, SecuLution Application Whitelisting allows you to stay cool.
Anything that is not clearly hashed on the whitelist cannot be executed. It's that simple.
The verification of software with SecuLution takes only 30 milliseconds. A virus scanner with real-time scans and behavior-based analyses requires the appropriate resources and time.
Thanks to SecuLution, computers run smoothly again and do not have to be upgraded so frequently.
Read about the opinions of other users and their experiences with SecuLution.
The reports and tests listed here are all from real users who describe their own experiences and criticisms. We have no influence on the content of the reports.
The smallest but most important component.
On each computer secured with SecuLution, the agent generates a hash from the applications to be started. This hash is unique to each program like a fingerprint and is used to verify the integrity of the starting program. If the generated hash is not on the server's Whitelist, execution of the software is denied.
Your interface for monitoring and managing the Whitelist.
The AdminWizard enables you to maintain the list of hashes and let you decide which software can be executed by which user. The AdminWizard is also responsible for configuring the agent. You can differentiate the behavior of the agent for user groups. Only administrators have access to this software.
The central interface for SecuLution Agent and AdminWizard.
The server contains the whitelist you maintain and the associated rules for the managed objects. It is installed as a virtual machine in your network so you keep full control over your data at all times. There is no connection to the Internet or to a cloud service.
Weekdays from 7am – 4pm
|Windows||All Versions ≥ XP SP3*||All Server Versions ≥ Windows 2003*|
(Only applicable for SecuLution Server)
|VMWare ESXi**||4.0 – 6.5||1 CPU (Recommended: 4 CPUs)|
512 MB RAM (Recommended: 2 GB RAM)
512 MB Hard disk space
E1000 Network adapter
* For legacy MS Windows versions (Windows NT4, Windows 2000, and Windows XP <SP3), a compatible feature-limited version of the Agent can be provided on demand.
** Although it is possible to run on other virtualization solutions such as Hyper-V and Xen, we recommend that you only use VMWare or VMWare Player because of its performance advantages.