1~5 item / All 5 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~5 item / All 5 items
"Ivanti Application Control" provides application whitelisting and permission management features. With a unique approach, it alleviates the ongoing burden on IT departments required for maintaining whitelists, achieving a balanced application execution control between operational load and security. Additionally, by applying execution permissions through digital signatures of files, it can prevent the execution of tampered or impersonated applications. 【Features】 ■ Windows permission management ■ Application network access management ■ Command line matching ■ Condition management ■ Blacklist *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "HEAT Application Control" is a product that enables the execution of only authorized applications by adopting the concept of a whitelist. Execution of unauthorized software or unknown applications that are not registered on the whitelist is blocked without exception. It can also prevent targeted attacks and zero-day attacks that cannot be fully mitigated by antivirus alone, protecting endpoints from cyber attack threats. 【Features】 ■ Launch control via whitelist ■ Protection against zero-day attacks and unknown viruses ■ Prevention of targeted email attacks ■ URL whitelisting ■ Prevention of spyware *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document provides an overview of the whitelist-based device control. It introduces the features of "HEAT Device Control," a solution that blocks even unknown threats without any loopholes, reduces the risk of information leakage, and the security measures that can be achieved with this solution. It serves as a useful reference when considering implementation. [Contents] ■ Overview of whitelist-based device control - Features of device control ■ Security measures that can be achieved with this solution *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Ivanti Device Control" is a product that enables comprehensive data leak prevention through whitelisting and encryption. With whitelisting, only authorized devices can be used on endpoints such as PCs, networks, and thin clients. It controls the transfer of data in and out, ensuring thorough measures against information leaks. Access to unauthorized or unknown devices is prohibited by default. 【Features】 ■ Access control through whitelisting ■ Prevention of personal device usage ■ Theft and loss prevention through encryption ■ Compatibility with all devices ■ Individual management of devices using unique IDs *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "HEAT Application Control" is a security software that enables the execution of only authorized applications by adopting the concept of a whitelist. The execution of unauthorized software or unknown applications that are not registered on the whitelist is blocked without exception. It can prevent targeted attacks and zero-day attacks that cannot be fully mitigated by antivirus alone, protecting endpoints from cyber attack threats. [Uses] ■ Measures against targeted and zero-day attacks ■ Virus and spyware protection ■ Enforcement of the use of standard software within the company ■ Prevention of unauthorized software installation *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration