See Who’s Using BorderLAN                                    

Application Whitelisting

Anti-Executable also known as application whitelist, is an important part of a complete layered security strategy, making it so that only approved software and applications to run on your computers. All other software and programs – doesn’t matter if they’re malicious junk, unlicensed, unwanted or just unnecessary software – are blocked before they are able to execute.

Anti-Executable give management to enforce only total compliance and provides absolute management control over individual workstations like nobody has before. Organizations and companies loves the benefits from on-task work days, while at the same time allows IT personnel to guaranteed that all computers ability to be compliant with the proper use policies, regulatory needs and requirements that they can now enforce.

Take the Anti-Executable Challenge
Download Your Free Trial And Try Anti-Executable For Yourself.
Stoping Malicious Software
Absolute protection from unauthorized executables protecting users from applications and software related threats including keyloggers, spyware and malware. With this added layer of security your IT staff will love the reduction in support tickets and your employees will experience less down time.

Desktop Security
As in a layered security strategy, Anti-Executable makes up the second important layer of security stopping both malicious software and employees installing pirated programs risking your companies compliance. For more information on layered and desktop security.

Stop Distracting Software
Workstation computers are typically used for very specific purposed, Anti-Executable can also be used to block notorious workplace distractions and interruptions including games, IM clients and P2P application that would otherwise take away from that specific purpose.

Keep Workstation Compliant
Average noncompliance costs to organizations runs 2.65 times more than it would by simply meeting your compliance objectives, with Anti-Executable and whitelisting your applications you can stop workstations from running any unauthorized programs ensuring your compliance.

Anti-Executable Key Features

Security Features

  • Protecting against malware, spyware and unwanted applications
  • Programs that are not in the admins whitelist list will not run
  • Allowing only that authorized users to configure/disable it

Whitelist Application Features

  • Automatically creates workstation whitelist
  • Whitelists can be imported, exported, viewed, edited, searched, merged, and sorted
  • Multiple whitelists ability supported and centralized easy-to-use deployment
  • Whitelist folders feature allowing, CD-ROM, USB, disk, or network drive to be exempt or used from the whitelist
  • Allows for definition files to not be updated
  • Creating a log for all unauthorized attempts or installations
  • Scanning workstations that are remote, creating their whitelists

Compatibility Options

  • Compatible and able to work with the major anti-virus software
  • Works with Active Directory and with Group Policies
  • Ability to designate specific software, for example an antivirus, to be allowed and exempt from restrictions
  • Maintenance Mode allows software updates/installations
  • Automatically enters Maintenance Mode when it detects that a Deep Freeze Maintenance Event has Thawed the computer

Expanded Flexibility Options

  • You can Allow or block executables from a USB and/or CD/DVD drives
  • Schedules shutdowns, restarts, and Wake-on-LAN actions
  • Temporary Execution Mode allows unrestricted software execution for a designated period of time
  • Ability to run a report on executed programs during Temporary Execution Mode
Expanded Protection and Control

  • Blacklist can be used in addition for an additional layer of security
  • Use files, publishers, and path based entries for whitelists and blacklists
  • All executable that are on the blacklist will not be allowed to run
  • Allows for silent install for all rapid network deployment
  • Password protection option for total security
  • Enable or disable Anti-Executable on the fast
  • Deploy as part of a master image
  • Displays a customized violation message when a user attempts to perform an action that is not authorized by Anti-Executable
  • Unique protection levels for administrators, Trusted and external users
  • Stealth Mode hides the presence of Anti-Executable while keeping the computers fully protected
  • Includes Identifile – a tool to compare files against a signature database for better visibility into files
  • Control over .scr,.jar,.bat,.com,.exe and .dll files

Enterprise Control

  • Faronics Core provides centralized deployment, configuration, scheduling, and control
  • Rapidly install Anti-Executable on any or all workstations
  • Activate/deactivate protection on one or more computers
  • Manage and export log records of violation attempts
  • Change maintenance schedules on the fly
  • Group and filter workstations for easy management
  • Instantly update passwords on protected workstations
  • Communicate with computers over a LAN, WAN or the internet
  • Active Task Feature ensures changes are applied to unavailable workstations by resending tasks when the computer can be reached

Anti-Executable System Requirements

Faronics Anti-Executable can be installed on the 32 bit edition of Windows XP SP3 and 64 bit edition of Windows XP SP2, 32 and 64 bit editions of Windows Server 2003, Windows Server 2008. Windows Vista, and Windows 7. Faronics Core system requirements can be found in the Faronics Core guide. The hardware specifications are the same as those required by the host operating system.

Anti-Executable Screenshots

Anti-Executable Testimonial

“Anti-Executable and Deep Freeze do what they advertise. I use these products in a public access environment and they do a good job at keeping the systems clean…”

Phil Minaker,
Supervisor, Sudbury, ON

“I have told a number of I.T. Directors that Faronics makes a great product. One of your best customer retention tools is your Tech Support folks…”

Bob Jesus, IT Department,
South Shore Charter Public School