Application Whitelisting + Control

☂️ Meets cyber security insurance requirement

What is it?

Application Allowlisting permits only approved applications to execute, thereby automatically blocking untrusted programs, which includes ransomware and various types of malware.

Why it's important?

Application Allowlisting is recognized as a top-tier defense for enterprises against all types of malware. Different from antivirus solutions, it gives Puma’s engineers the power to dictate exactly which applications, scripts, and executables are permitted on their networks, effectively preventing both known threats and unauthorized software from executing. This method drastically reduces the risk of cyber-attacks and unapproved software operating within your network.

How it works:

Puma will implement a plan to roll out Application whitelisting across your organization. Once installed, we first configure it to operate in Learning Mode. During this period, all applications and their dependencies found on the computer are cataloged and polices are created to permit them. After the learning period, Puma’s engineers can review the list of applications, remove those that are not required, and secure the computers. Once the computers are secured, any untrusted applications, script or library that try to execute will be denied. The staff can request new software from the IT administrator, and it can be approved in 60 seconds.

What are the benefits?

Allowlisting

When enabled and configured correctly, Application Whitelisting can deny any application from running on your device that is not a part of the allowlist. This helps to mitigate and stop cyberattacks from happening on your devices or across your network.

Firewall-like Policies

A powerful firewall-like policy engine that allows you to permit, deny or restrict application access at a granular level.

Time-Based Policies

Permit access to applications for a specified amount of time. Automatically block the application after the policy has expired.

Enabling updates without alerts

When configured, our system automatically adds new unique hashes when application and system updates are released, allowing your applications to update without interference while preventing updates from being blocked.

Here to answer all your questions!

Let's reduce risk together

Contact us

42
entitlements to explore

Learn more about PUMA's Core, Core+, and Complete entitlements. Click one and learn how they work, why they are important, and their benefits.

Service Desk Core entitlements
Support For Your Staff

Service Desk Core

Supporting Your Technology

Service Desk Core

5 Ways We Support You

Service Desk Core

Access to Engineers

Service Desk Core

Fast SLA Guarantee

Service Desk Core

Asset & Inventory mgmt.

☂️ Meets cyber insurance

Account Management Team

Service Desk Core

Procurement & Sales

Service Desk Core

IT Strategy with vCIO

Service Desk Core

Identity Management

☂️ Meets cyber insurance

Security & LoB patching

☂️ Meets cyber insurance

Data Encryption Support

☂️ Meets cyber insurance

MFA Support

☂️ Meets cyber insurance

Vendor Management

☂️ Meets cyber insurance

Web traffic & Content Filter

☂️ Meets cyber insurance

NGAV - Virus License & Support

☂️ Meets cyber insurance

EDR & MDR license & Mgmt.

☂️ Meets cyber insurance

Security Baseline for Endpoints

☂️ Meets cyber insurance

PBX & Phone systems

Service Desk Core

Microsoft 365 Support

Service Desk Core

Network Support

Service Desk Core

License & SaaS mgmt.

Service Desk Core

ISP & Internet Mgmt.

Service Desk Core

Service Desk Core+ additional entitlements
Phishing Simulation

☂️ Meets cyber insurance

Vulnerability & Pen Testing

☂️ Meets cyber insurance

Security Awareness Training

☂️ Meets cyber insurance

DNS Advanced Filtration

☂️ Meets cyber insurance

Dark Web Filtration

☂️ Meets cyber insurance

Password Manager for Staff

☂️ Meets cyber insurance

HIPAA Platform & Mgmt.

☂️ Meets cyber insurance

Security Risk Assessment

☂️ Meets cyber insurance

Application Whitelisting

☂️ Meets cyber insurance

MDR + 24/7/365 SOC

☂️ Meets cyber insurance

Network Control

☂️ Meets cyber insurance

Ringfencing

☂️ Meets cyber insurance

Elevation Control (PAM)

☂️ Meets cyber insurance

Storage Control

☂️ Meets cyber insurance

Service Desk Complete
On site visits

Service Desk Complete

Unlimited Projects

Service Desk Complete