Application-level security attacks, such as file system corruption, registry corruption, spyware, and keylogging pose a serious threat to mission critical business operations. Arellia Thycotic Application Control Solution™ (ACS) software helps you manage this risk by enabling you to control the software applications in your environment.
To find out what you You can do with ACS, go to Introduction to Application Control Solution (ACS) 8.0.
...
the following in ACS:
- Whitelisting, orangelisting, and blacklisting - control what applications are and are not allowed to be run on an endpoint, with the ability to orangelist applications that have not been classified.
- Reference System, Software Delivery Package, File Owner or Digital Certificate whitelists can be used to speed up whitelist policy creation
- Elevate privileges for standard users - instead of end users seeing the UAC prompt, they can have installers, updaters and applications elevated automatically.
- Implement the principle of least privilege, that is require each subject in a system is granted the most restrictive set of privileges necessary for them to perform their tasks, to limit damage that can result from accident, error, or unauthorized use. (For details about how to protect your system from malicious behavior, go to Restrict an Applicationapplication's Process Rightsprocess rights.)
Info | ||
---|---|---|
| ||
What'sNew Innew in ACS 8.1
|
...
|
Additional Application Control features:
- Protect against data theft by automating the encryption of documents utilizing ACS's seamless integration with Windows Encrypted File System. (For more information, search Microsoft for EFS Encryption, or go to Automate Document Encryptiondocument encryption.)
- Control an application's ability to read or write to specific network locations. (For more information, go to Prevent Read and Write to File Types or Network Locations.)
- Prevent potentially malicious applications, such as keyloggers, from installing Windows API hooks. (For more information, go to Restrict Malicious Applicationsmalicious applications)
- Protect against viruses and spyware. (For more information, go to Quarantine Files.)
Standard Use Cases
For sample scenarios that highlight the functionality and use of this solution, go to Standard Use Cases.