Through our WhitelistCloud technology, CyberLock scans its tiny, customized whitelist specifically for safe / clean files and automatically creates firewall rules for unknown items.Instead, CyberLock displays a mini prompt prior to asking the end-user to make a decision on whether to allow a new item or not. CyberLock does not force the end-user to respond to dangerous affirmative user prompts, which eliminates the possibility the end-user inadvertently allows an unknown item. Our patented snapshot technology automatically builds the tiny, customized whitelist for the end-user, resulting in the smallest possible whitelist and attack surface in the industry. Before CyberLock, all application whitelisting products were active full-time, often when it did not make sense to be active, which most users and Administrators found to be annoying and untenable, so they would choose to forgo application whitelisting altogether. Cybersecurity experts agree that application whitelisting is by far the most effective security mechanism on the market, but no one ever bothered to make this technology user-friendly enough for the masses, until we created CyberLock.Because of our dynamic security postures feature, CyberLock is able to offer a tighter and more robust lock than is possible with any other product. CyberLock solves this issue by dynamically adjusting its security posture on the fly, based on the end-user’s current activity and behavior.
0 Comments
Leave a Reply. |