Whitelisting Application Software
Modern antivirus software and firewalls can only prevent some malicious attacks on your machine. Application Whitelisting is considered the single more effective cyber security strategy by both NZCERT and the Austalian Signal Directorate (ASD)
What is application whitelisting?
Application whitelisting is a cyber security process which only allows for specific software to run on business machines. This service provides broad-spectrum security against any malware, whether it arrives via the internet, USB or email.
What does our service do?
Since modern software and operating systems are always updating, the new software will always need to run on your computers for them to function. Cyber Toa offers a supervised application whitelisting process through a software package called Whitecloud.
As part of our service, a Cyber Toa specialist will:
Install Whitecloud on all Windows machines
provide ongoing oversight of the processes that are running on your machines
Check every new program that attempts to run on protected machines
Not allow programs from untrustworthy or malicious sources to run
Log attempted exploits that are attempted against your machines
Log what software is being run which we are able to report on
Cyber Toa can also provide training to clients which will allow them to monitor the system independently.
We are partnered with GBMS Tech ltd. to bring you Whitecloud Security.
Whitecloud Security is an easy way to start enhancing your security posture, we have the technology available that is low in cost, simple to use and highly scalable.
What types of endpoints doEs whitecloud security protect?
White Cloud Security protects all the following types of endpoints running Microsoft Windows platforms:
Desktops and Servers
Laptops, Tablets, and Portable Devices
Industrial Control Systems
Automatic Teller Machines (ATMs)
Casino Gaming Machines
What types of malware attacks Does whitecloud security protect against?
White Cloud Security blocks untrusted executables and untrusted scripts. This includes:
Ransomware, executable or script based; e.g. CryptoLocker, CryptWall
Wiper Virus type attacks
Stuxnet type attacks against Industrial Control Systems
Watering Hole type attacks where hackers infect trusted websites
Droppers from Websites
Phishing and Spear Phishing Attack type infections
Keyloggers and similar information stealing trojans
Executable and Script based Internet Worm type attacks