Application Allowlisting

Application allowlisting

Block ransomware and malware from executing

Top-tier cyber security strategy to prevent untrusted software and malware from running. Stop zero day exploits and protect your Windows and macOS workstations with default deny access control.

Why allowlisting

Stop unknown threats

Stop relying on never ending blocklist updates and protect against vulnerabilities that have not been discovered yet.

Streamline compliance

Demonstrate adherence to Deny by Default-aligned regulatory requirements, including NIST, HIPAA, and PCI-DSS. 

Control "Shadow IT"

Prevent employees from using untrusted or undesired software on the company network.

Demo

Windows allowlisting

Control what applications can run on your Windows endpoints, leverage app catalog to allow applications with a single click, control app interactions with application fencing, control applications from Windows store, and automatically elevate applications.

macOS allowlisting

The simplest way to implement application control across your macOS devices. Idemeum leverages Endpoint Security API to control application execution. Leverage pre-configured catalog to allow applications and their dependencies with a single click.

Features

Application control

Allowlisting comes with a default deny policy, that means that if application is not explicitly trusted, it can not run. You can apply simple rules to define what applications can execute in your environment.

OS files trust

Idemeum allowlisting automatically detects and allows all required operating system binaries and DLLs to execute, so that idemeum in not interfering with normal operating system operations and OS updates.

Weaponized app protection

We block OS binaries that can be weaponized by attackers. We rely on Microsoft recommended lists and Project LOLBAS to determine what executables need to be blocked. If you need these programs for legitimate use, you can always create an allow rule.

Flexible rule engine

Idemeum allowlisting offers a very flexible rule engine to help you identify applications to trust. You can match applications using file attributes, publisher certificates, or certificate elements.

Unified audit

Idemeum desktop agent captures every execution and elevation event and uploads this information to your cloud tenant in near real-time. There are no duplicates, and you can easily see the applications being launched along with all necessary metadata.

Integrated elevation

Allowlisting integrates seamlessly with Endpoint Privilege Management. With a single rule you can allow application to run as well as automatically elevate without the need to give use full-blown admin rights.

Application fencing

If you trust an application you can allow chained execution, meaning you can automatically allow all child processes for a trusted application. This way you do not have to learn applications and create separate rules for each component.

Catalog rules

Idemeum offers you curated rules catalog that you can use to allowlist most common application with a click of a button. There is nothing for you to do, as idemeum team will maintain and update these rule definitions.

Get started - it's free

Sign up for your cloud tenant and use all idemeum features for free for up to 10 endpoints.