https://mobirise.com/
1000

Signature-Updates
for Anti-Virus every day

35000

new Viruses daily

1

Software that does not need
Signatur-Updates

APPLICATION-WHITELISTING vs. ANTI-VIRUS


SecuLution is not an Anti-Virus product.
SecuLution is a state-of-the-art endpoint security solution with fine-grained rights management that provides much more than just protecting the computer from malicious software. Nevertheless, we are often asked to compare it to an antivirus solution.
A brief summary:

BLACKLIST


Since the first malicious software in the 1970s, IT security products have been trying to detect and prevent malware by means of signatures or behavioral patterns (Anti-Virus). Since malware contains specific adjustments to stay undetected, Virus-Scanners have lost effectiveness dramatically. Because a blacklist can only prevent what is already known - e.g a certain malicious program or a certain behavior. If the malicious program and its behavior are not known to the Anti-Virus software, it can cause unhindered damage to the network. In fact hundreds of networks become victims of attacks by malicious software every day, despite the administrators’ use of state-of-the-art malware detection software, up-to-date blacklists (signature lists), and complex behavior-based analyses.
The number of successful attacks has been growing steadily for years, as the Identity Theft Resource Center surveys show since 2005

WHITELIST


The secure and reliable protection against any unwanted software is Whitelisting. While Anti-Virus software defines what is forbidden (blacklist) and allows everything unknown, the Whitelist does exactly the opposite:
It defines trustworthy software. Everything else can not be started.
This automatically defeats malicious software.

This protection can not be overcome by constant modification of the malicious code because cryptographic methods can not be used to create malware which carries the hash (fingerprint) of software that is defined as trustworthy.

SECULUTION WHITELIST SETUP

  1. Install SecuLution Server, AdminWizard and Agent
  2. Wait a week while the system learns which software is used on your network
  3. Check the trust level of the software you have learned and delete unwanted software with one click

  4. Sit back!


Only software that you trust is now able to run in your network.

Period.

 

For details on the setup steps above, please refer to our online documentation:

SHOW ME

KNOWLEDGEBASE

COMMERCIALISATION OF CYBERATTACKS

For a number of years, professionally organised, enterprise-like structured criminal gangs emerged. One department develops, tests and modifies the malicious software until Anti-Virus solutions can not detect them anymore. Another spreads the code by e-mail, exploiting breaches in browsers or targeted attacks through company employees. The perpetrators gain multi-digit million range profits.

Driven by this commercialisation, malicious software has changed significantly. It is now less invasive to remain undetected for as long as possible. Thus it can infiltrate the victim's network longer and spread more selectively on sensitive parts of the systems. Most modern malware does not contain any viral (= self-spreading) or malicious function at all. This is, if necessary, only downloaded, in order to postpone a discovery by defense mechanisms for as long as possible.

Apart from whitelisting, there are no effective protective measures. This has been a recognised state of the art since the end of 2015.

READ THE ARTICLE

Ransomware (also called "blackmail Trojan" or "crypto-trojan") encrypts the data on the hard drives of the victim. The code required for decryption is released after payment of a ransom. (Examples are WannaCry, Locky, TeslaCrypt, CryptoLocker, Crysis, zCrypt, Powerware, Petya, HydraCrypt, Cerba , RAA, CryptoWall und Gpcode.) Since modern Ransomware encrypts data securely cryptographically, a recovery of the data is only possible via a backup or paying the ransom. Which is not recommended.

Phishing software steals the victim's personal data (identity theft), which allows the perpetrator to access online payment systems or redirect financial transactions. (Examples are Cidex, Dridex, Shylock and Citadel.)
The resulting damages are in the double-digit million range annually.

Spyware allows unauthorised users to access the computer network and the victim's programs and data. The commercial interest of the attackers is economic espionage and data manipulation. (Examples are Flame, Stuxnet, AC / DC, Skywiper.)
Spyware usually does not replicate itself aggressively (virally) and therefore remains undetected by Virus-Scanners for a long time.

Viruses and worms are programs that usually limit the proper functioning of the computer. (Approximately 35,000 new variants are developed per day.)
They spread themselves aggressively to deal the greatest possible damage before they are discovered.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque quis quam in risus pulvinar ultrices eget non sem. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae proin accumsan odio.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque quis quam in risus pulvinar ultrices eget non sem. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae proin accumsan odio.

TEST SECULUTION APPLICATION-WHITELISTING
FOR *FREE.
8 WEEKS IN YOUR NETWORK.


Please fill out the contact form and we will contact you as soon as possible.

OR GIVE US A CALL:
UK +44 1617 381 420
GER +49 2922 958 9210

* The test configuration includes 50 licenses and limited  access to the SecuLution TrustLevel database for 8 weeks. There is a one-off fee for the initial set-up and training. Should the free product test convince you and you become a customer, we will waive this fee.