- Flexible control is easy with the built-in Trusted Publisher function. Now you can manage all updates from a specific publisher like Microsoft using one click of the mouse. With four levels of control, you can bring on the details and even specify the right software version for your company. It also comes with folder level control, and USB/CD drive limiting. And the ability to create multiple policies for different departments or user groups.
- Automation makes getting started a piece of cake. You can leverage your existing Active Directory settings to create the right protection levels for the right users. Once installed, it automatically scans and populates the Control List for you. After you’re up and running, Trusted Publisher helps you manage updates automatically from the software manufacturers you trust.
- Investigate a file by checking it against the IdentiFile™ database. Making decisions about which files to trust is a routine IT dilemma, but guessing can lead to all sorts of problems. The next time you find yourself questioning the trustworthiness of a specific program, simply look it up in the online database. With millions of hashes stored, it’s a great source of up-to-date information that can help keep your organization safe. And if your file is not entered yet, be the first to submit and help users across the nation.
- Central management through Faronics Core console allows you to deploy, configure and control with ease. You can add or remove files on the fly and apply them to all relevant PCs in a few clicks. Inside the console, you can tell that the product is working by reading the reports. These reports reveal which programs are trying to gain access to your network most frequently and which machines have the highest number of violations.
Faronics Anti-Executable can be installed on the 32 bit edition of Windows XP SP3 and 64 bit edition of Windows XP SP2, 32 and 64 bit editions of Windows Server 2003, Windows Server 2008, Windows Vista, and Windows 8.1. Faronics Core system requirements can be found in the Faronics Core guide. The hardware specifications are the same as those required by the host operating system. It is also available in Standard for standalone computers and enterprise networked computers.
Faronics Anti-Executable safeguards PCs like never before. It offers the ultimate protection from sophisticated threats like zero-day attacks, mutating malware, and advanced persistent threats. Application control provides security beyond anti-virus. Compare the solutions now to see if you’re at risk. By ensuring that only approved applications are allowed to run, it keeps machines free of infections. If a file isn’t on the list, it doesn’t run. Protect your organization from unauthorized applications and watch the number of IT tickets shrink with the best application control solution on the job.
Forget about the traditional hassles of setting-up a complicated whitelist. With the free central management tool – Faronics Core — you can install and manage application control efficiently with a few clicks of the mouse. It comes with several smart features designed to save you time. Get started by creating protection levels using your existing Active Directory settings. Automatic scanning upon installation populates the control list for you and creates customized user groups allowing you to balance diverse user needs with proactive security.
Managing updates is easy with a set-it-and-forget approach. With four levels of publisher control, you can allow all updates from a trusted publisher like Microsoft or get really detailed by specifying the exact software version in use. Now you can stop worrying about compliance. We’ve got you covered. Since you control the software installed on your endpoints, you can stop worrying about an audit or even worse, fines for unlicensed software.
- Protecting the Community
The Los Angles Police Department was finding too many laptops in patrol cars in need of IT support. Laptops provide an essential connection to intelligence that helps officers protect the community. Damaged laptops forced officers to troubleshoot machines or took the squad car off the streets. With Anti-Executable on the job, mobile laptops are available and secure without depending on IT personnel. Officers now have the tools they need to help protect the community 24/7.
Read the complete case study»
- Saving 20 Hours/Month at School
North Country Community College found they were faced with too many computers in the shop because they were constantly trying to enforce acceptable use policies for unauthorized downloads. After installing Faronics Anti-Executable, they no longer worry about malware or undesirable programs trying to execute on their machines. In fact, not only are users enjoying continuous availability, but the IT team has saved almost 20 hours each month by receiving significantly fewer support requests.
Read the complete case study»
- Protecting Your Privacy and Your Money
RTP Federal Credit Union was concerned about tightening security on employee workstations in order to protect the financial assets of their members. Handling thousands of financial transactions, data security was of paramount importance and a data breach could spell disaster for their reputation. RTP turned to Faronics Anti-Executable to provide proactive protection for their customers. It’s helped them enforce acceptable use policies, dropped malware incidents and IT tickets, and helps them meet industry compliance standards.
Read the complete case study»
The state of IT security is constantly shifting. Keeping up-to-date is vital to protecting your organization. Faronics unveils the results of the State of IT Security Study conducted by the Ponemon Institute -- a leading research authority on data security. We'll share emerging trends and discoveries about what's stopping IT professionals from achieving optimal security. We also reveal the total cost of a data breach and expose a dangerous perception gap about the lasting effects of reputation damage. In this webinar you will learn about: Current security strategies 2012 cyber threat landscape Hidden costs & spread of data breaches Long-term effects of reputation damage.
One of the most common remarks we hear is how well Deep Freeze helps our customers to protect their classroom, lab, student and public access computers. They love how they can set it and forget it. But they often ask how to protect staff computers without using Deep Freeze, since they're a major burden on the IT department. So what's the cause of the volume of IT support tickets? Malware infections and users installing unauthorized software.
5 threats your anti-virus won't stop
What can possibly go wrong when you mix human curiosity with real and costly internet risks? Avoid this dangerous combination. Anti-virus alone will not protect your business from poisoned links, malware laced downloads, and social media scams. In this 60-minute webinar where you will learn about cybercriminals targeting the human element and the strategy you need to protect your organization.
Stopping unauthorized executables from wreaking havoc on your network is mission critical. And now it's easier than ever with Faronics Anti-Executable 5.0.
By stealing your company's data for profits, cybercrime pays so well it's now exceeding the global drug trade. Advanced persistent threats, zero-day attacks, and sophisticated malware are emerging every day. Managing IT security for your organization has never been more difficult. Stopping unauthorized executables from wreaking havoc on your network is mission critical. And now it's easier than ever with Faronics Anti-Executable 5.0. It's a revolutionary approach to security with application control using a centralized list. Now you have the ultimate flexibility to customize user groups based on policies and local settings. You no longer have to update each machine when adding to the approved list.
Traditional anti-virus alone cannot protect your network against the top social media threats of 2012. So what’s your social media defense strategy?
Today's cyber-criminals are organized, sophisticated and have access to the latest technology. With so much money at stake, they can afford to invest in the tools and technology to stay ahead of traditional computer security.
Check out these 5 videos on how to perform some of the most common tasks with Faronics Anti-Executable.Learn how to easily update programs with Maintenance Mode, block programs from ever running, add Trusted Users, add new software publishers, and add new programs.
Anti-Executable blocks files based on their file hash and not file name, thus making sure renaming a file does not bypass protection.
Here is a brief overview of how Faronics Anti-Executable blocks a phishing keylogger.
Here is a brief overview of how Faronics Anti-Executable blocks phishing malware and helps combat social engineering.
Here is a brief overview of how Faronics Anti-Executable blocks unwanted, unlicensed, unsanctioned or unauthorized programs from ever installing.
Watch this 2 minute demo on how simple it is to block unauthorized applications like Ultrasurf with Faronics Anti-Executable.
This is what layered security is all about. With the number and complexity of IT related threats steadily increasing, relying solely on one solution to ensure security is no longer enough. Our layered security solution provides optimum security against today's toughest threats.
The complimentary Faronics Anti-Executable dashboard adds great value to Anti-Executable Enterprise by visualizing the application control enforcement and violation information from across your entire organization in a web browser.
By making this information centrally available, IT professionals no longer need to provide information consumers with dedicated access to IT systems for them to generate reports on demand.
The Anti-Executable dashboard has custom widgets that provide valuable insight into the various aspects of application control.
Information such as recent violations, top blocked programs, top violated computers, violations statistics and charts can now be viewed on a single page. Each widget can be clicked on to launch a detailed report that can be printed or exported into excel, text and other formats.
Download the Anti-Executable Dashboard from here.
Detailed instructions on how to install and use the dashboard can be found in the dashboard manual.