Application Control

The simplest way to control application executions

Application management solution for whitelisting and blocking of running applications. Customize live sessions, log everything on the go, and prevent users from running malicious software.

Product sheet icon Product Sheet

Prevent any unauthorized application execution.

Effortless IT management.

Block Apps Icon

Multiple ways to allow or block apps

App Control allows users to allow or block application execution in more than one way: file path, publisher, certificate, vendor name, software name, MD5, and more. The choice is yours.

Automatic Icon

Automatic approval or denial flow

Accelerate your application approval or denial flow for system files with default ruling. Create or modify flows for individual users or AD groups.

Dual Modes Icon

Dual Modes Operation

Layers upon layers of granularity. Application Control operates in both active and passive mode. Take control of your user’s session or sit back, and let App Control weave its magic.

KEY BENEFITS

Unique Solutions for Advanced Problems

Combining App Control with Access Governance

Full-throttle your session application execution with additional access governance features by combining your App Control module with Privileged Access Management. App Control over PAM, allows for highly customizable admin sessions, giving you weapons you need to protect sensitive memory areas, hinder lateral movement inside your network, and safeguard your business assets.

dashboard

Extended audit trail

Explore new reporting features. App Control’s reporting module can help you gain additional insight into your elevated user session – applications opened, processes elevated per session, parent processes called, services requested, and more. Streamline your app/approval denial flow with historic executions, a feature that allows you to customize future elevated sessions by analyzing past sessions.

dashboard

Ease-of-use

App and process manipulation are usually done through a remote access tool. Get rid of the middleman and leap straight into the action. Use Application Control’s passive mode for live, rule-based, monitoring or define the rules yourself. Every byte of collected info is fed directly to your dashboard, where you can review the session’s details, further adjust user interactions parameters, request logs, and more!

dashboard

Productivity Overhaul

Say ‘goodbye’ to obsolete, endpoint-based tools with complicated licensing options and scalability issues. Application Control will ensure that your flows are enforced throughout the entire organization, giving you peace of mind and time to focus on other vital, organizational areas.

dashboard

Empower Any Security Software

Remove permanent rights and give access to application execution, when users need it. Application control also supports a full audit trail of Allowed Executions, Blocked Executions and Passive Mode monitored executions.

Unified Thread Platform Image Unified Thread Platform Image
Vulnerability Management Icon

Vulnerability Management (Prevent)

Next-Gen Antivirus Icon

Next-Gen Antivirus (Detect)

4 advanced malware detection layers complemented by Firewall controls and MDM allows effortless remediation of all known threats and scales up into a complete EPDR solution with the DNS security module.

Go to Product
Ransomware Encryption Protection Icon

Ransomware Encryption Protection (Detect)

COMBO: A signatureless encryption protection technology that kills and stops any ransomware encryption outbreaks, universally compatible with any antivirus but achieving what traditional antivirus is uncapable of.

Go to Product
Privilege Access Management Icon

Privilege Access Management (Comply)

Manage user permissions easily, prevent insider threat and strengthen your endpoint security with truly innovative access governance and the only solution to de-escalate on threat detection.

Go to Product
Application Control Icon

Application Control (Comply)

COMBO: A revolutionary and easy to use application control solution that enables white and blacklisting of any execution, and is the only app control that unifies with PAM.

Go to Product
Email Security Icon

Email
Security (Defend)

Email Fraud Prevention Icon

Email Fraud Prevention (Defend)

Remote Desktop Control Icon

Remote Desktop Control (Support)

DNS Filtering Icon

DNS
Filtering (Prevent)

Securing Global Industry Leaders

Acknowledging that change is the essence of staying on top, Heimdal® empowered its customers with the cyber-protection tool they need to shift the focus from tightened cybersecurity to ease of mind. Supporting and responding to industry leaders’ needs since 2014.

15M+

Protected Business

13M+

Patches Applied

15M+

Attacks Prevented

CUSTOMER REVIEWS

What Customers Say About Us

CENTRALIZED COMMAND CONTROL

One Unified Dashboard To Rule Them All.

The centralized dashboard unlocks the full potential of your threat-hunting engine and cyber-stance. Crisp graphics, intuitive controls, ready-to-download security status reports, ROI outlooks, mitigated threats, CVEs, and more conveniently stacked into a responsive and unified dashboard.

Dashboard Scroll Image
Dashboard Scroll Image

Or +1 813 670 6169