free web maker

WHAT IS SECULUTION?

Learn more about the three components that enable Application Whitelisting with SecuLution and how they work together.

KEY-FEATURES

The key functions of the SecuLution Application Whitelisting solution at a glance.

Application Whitelist

The backbone for protecting any corporate network

The foundation for Application Control. Check the use of DLLs, Java code and USB devices using hashes in addition to executable files. SecuLution achieves an incomparably higher level of security than conventional products by using this approach and consistently applying whitelisting.

See also SecuLution Antivirus.

Device Whitelist

Data Leakage Prevention

In addition to checking executable code, the use of USB devices can also be verified. Forget the cumbersome management of USB ports and their clearance. Instead, simply define which device in your network can be used by which user and at which endpoints.

Offline Modus

Full security, even offline

Even without a network connection, SecuLution protects mobile users and secures endpoints without connecting to the corporate network. Hashes stored in a local encrypted cache are used as an offline backup. Your endpoints always stay protected, no matter where they are.

Automated Patchmanagement

 Less work, saves time.

To avoid the hassle of adding each update separately to the SecuLution Whitelist, certain paths, such as your WSUS content folder or software repository, can be defined as trusted sources. As soon as new software is available, SecuLution recognises it and adds it to the whitelist without your intervention.

Permanent Learn User (PLU)

Your daily short cut

SecuLution integrates perfectly into your network, you can even use Active Directory objects to define a user or group of administrative users that allow you to run applications that are not yet on the whitelist. Simply run the new or blocked application as a learning user, the software will be included in the whitelist and automatically classified by your approval.

The functionality of the Permanent Learn  User should of course only be available to administrators.

USB Encryption

The perfect addition to the device whitelist

Give users the ability to encrypt (AES256) their business information on mass storage devices with SecuLution and protect it with a personal password. Even in the event of a data volume loss, the information is safe from third-party access.

Data Leakage Prevention can be realised effectively and without additional software.

TrustLevel Database

The perfect addition to the Application Whitelist

No one can overlook every application in their network, let alone make a statement about whether they want to include all applications on their Application Whitelist. So that you don't have to check thousands of unknown applications individually, we provide you with a service that allows you to check all unknown applications for authenticity with just two clicks.

Built-In Agent Deployment (RCM)

Who is protected, who is not?

Start the distribution of the SecuLution Agent with two clicks on selected endpoints. Our software distribution takes care of the rest for you.

Maintain an overview of the secured hosts on the network without the need for a comprehensive software distribution solution.

PRODUCT INFORMATIONS

WHITEPAPER PRODUCT BROCHURE BOOKLET

ADVANTAGES OF SECULUTION

With SecuLution Application Whitelisting, you not only benefit from the obvious advantages for your network security.
There are other advantages that only become visible at second glance. Here are three examples:

Explicitly

Doubts about false positives such as Antivirus products often cause because of their mode of operation are now a thing of the past. Thanks to hash checking against the central whitelist in your corporate network.

Either an application is uniquely identifiable by hash or it cannot be executed. It's that simple.

Carefree

Even if a new wave of Ransomware attacks networks worldwide and other Antivirus solutions are powerless, SecuLution Application Whitelisting allows you to stay cool.

Anything that is not clearly hashed on the whitelist cannot be executed. It's that simple.

Increased Performance

The verification of software with SecuLution takes only 30 milliseconds. A virus scanner with real-time scans and behavior-based analyses requires the appropriate resources and time.

Thanks to SecuLution, computers run smoothly again and do not have to be upgraded so frequently.

REVIEWS

Read about the opinions of other users and their experiences with SecuLution.

The reports and tests listed here are all from real users who describe their own experiences and criticisms. We have no influence on the content of the reports.

SEE THE REVIEWS

SecuLution
AGENT

The smallest but most important component.
On each computer secured with SecuLution, the agent generates a hash from the applications to be started. This hash is unique to each program like a fingerprint and is used to verify the integrity of the starting program. If the generated hash is not on the server's Whitelist, execution of the software is denied.

SecuLution
ADMINWIZARD

Your interface for monitoring and managing the Whitelist.
The AdminWizard enables you to maintain the list of hashes and let you decide which software can be executed by which user. The AdminWizard is also responsible for configuring the agent. You can differentiate the behavior of the agent for user groups. Only administrators have access to this software.

SecuLution
SERVER

The central interface for SecuLution Agent and AdminWizard.
The server contains the whitelist you maintain and the associated rules for the managed objects. It is installed as a virtual machine in your network so you keep full control over your data at all times. There is no connection to the Internet or to a cloud service.

PRODUCT INFORMATIONS

WHITEPAPER PRODUCT BROCHURE BOOKLET

TEST SECULUTION APPLICATION WHITELISTING
8 WEEKS IN YOUR NETWORK.



Please fill out the contact form and we will contact you as soon as possible.

OR GIVE US A CALL:

Weekdays from 7am – 4pm

REQUIREMENTS

OPERATING SYSTEM
(Agent*, AdminWizard)
VERSION


WindowsAll Versions ≥ XP SP3*
All Server Versions ≥ Windows 2003*
Citrix compatible
VIRTUALISATION
(Only applicable for SecuLution Server)
VERSION
RESSOURCES
VMWare ESXi**

4.0 – 6.5
1 CPU (Recommended: 4 CPUs)
512 MB RAM (Recommended: 2 GB RAM)
512 MB Hard disk space
E1000 Network adapter

* For legacy MS Windows versions (Windows NT4, Windows 2000, and Windows XP <SP3), a compatible feature-limited version of the Agent can be provided on demand.

** Although it is possible to run on other virtualization solutions such as Hyper-V and Xen, we recommend that you only use VMWare or VMWare Player because of its performance advantages.