Introduction to Application Control Solution (ACS) 8.0

Application-level security attacks, such as file system corruption, registry corruption, spyware, and keylogging pose a serious threat to mission critical business operations. Arellia Application Control Solution™ (ACS) software helps you manage this risk by enabling you to control the software applications in your environment.

With ACS you can perform the following:

  • Create policies to automatically inventory software packages or systems and add authorized applications to a whitelist. 

  • Create policies to whitelist trusted file owners or digital certificates.

  • Elevate privileges for standard users.

  • Implement the principle of least privilege, that is require each subject in a system is granted the most restrictive set of privileges necessary for them to perform their tasks, to limit damage that can result from accident, error, or unauthorized use. (For details about how to protect your system from malicious behavior, go to Restrict an Application's Process Rights.) 

NEW!

What's New in ACS 8.0

 

  • Apply security ratings to withstand future attacks by reducing the number of applications that are available to exploitation. (For more information, go to Manual Security Rating Filters.)
     
  • Isolate applications to protect against file system and registry corruption or misuse. You can achieve this goal by integrating with Altiris® Software Virtualization SolutionTM software. (For more information, go to Run an Application in a Workspace Virtualization Layer.)
     
  • Protect against data theft by automating the encryption of documents utilizing ACS's seamless integration with Windows Encrypted File System. (For more information, search Microsoft for EFS Encryption, or go to Automate Document Encryption.)

  • Control an application's ability to read or write to specific network locations. (For more information, go to Prevent Read and Write to File Types or Network Locations.)
     
  • Prevent potentially malicious applications, such as keyloggers, from installing Windows API hooks. (For more information, go to Restrict Malicious Applications)
     
  • Protect against viruses and spyware. (For more information, go to Quarantine Files.)