APPMOAT IS THE PROACTIVE ENDPOINT PROTECTION TOOL THAT PAIRS WITH EXISTING REACTIVE SECURITY SOLUTIONs
User Profile
and System Data
AppMoat® runs non-trusted code with temporary credentials that cannot access real user profile data, documents, or system files.
Mapped
Network Drives
AppMoat® runs non-trusted code with temporary credentials that cannot access shared network resources such as mapped drives.
USB
File Systems
AppMoat® runs non-trusted code with temporary credentials that cannot access USB file systems.
EMAIL CONTACTS /
PASSWORD KEYCHAINS
AppMoat® runs non-trusted code with temporary credentials that cannot access email contacts, stored passwords, or other private data.
AppMoat® runs new or modified software on-the-fly within a temporary container using alternate credentials.
NEW APPS RUN INSTANTLY WITH LIMITED ACCESS
HOW APPMOAT WORKS
AppMoat® can fully protect an enterprise endpoint without blocking software from running instantly on devices.
AppMoat® is the only tool short of process virtualization that can prevent a rogue program from stealing/inheriting the credentials of the authenticated user.
The Automated Enterprise Safety Net™
Real-Time
SafeLook® accounts are generated on-the-fly.
Limited Access
SafeLook® accounts have limited access.
Clean Reboot
SafeLook® accounts reset at reboot.
Sanitization
Executable content is scrubbed when the process exits.
App Settings
Application settings are preserved.
App Data
Saved content is moved to the desktop after sanitization.
PREVENT RANSOMWARE AND ZERO-DAY THREATS ON Windows® ENDPOINTS AND SERVERS
PROCESS CHART
Features and benefits depend on system configuration and may require specific hardware, software, or service activation. On-the-fly sandboxing requires NTFS Filesystem; Optional Intel® SGX capability requires compatible hardware.
U.S. Patent No. 7,624,439 for “Authenticating Resource Requests in a Computer System”
U.S. Patent No. 7,149,800 for “Auditing Computer Systems Components in a Network”
U.S. Patent No. 7,685,174 for “Automatic Regeneration of Computer Files”