Austin, Texas July 28, 2010 CoreTrace, the leading provider of secure and flexible application whitelisting solutions, announced today a powerful new version of its flagship product, BOUNCER 6.0. New functionality, including intuitive administration and application intelligence, positions CoreTrace at the forefront of application whitelisting innovation and offers enterprises an even easier to implement and maintain solution, leading to significant time and money savings.
Despite application whitelisting's clear security advantages over traditional approaches, some IT professionals have delayed adoption because of concerns around scalability and operational limitations, said Toney Jennings, president and CEO of CoreTrace. BOUNCER has always been one of the most secure application whitelisting solutions. With version 6.0, BOUNCER has improved scalability and is now the most flexible solution too, including the industry's simplest approach to adding new applications with the most relevant application intelligence.
One marquee feature of this release is "application intelligence" including the new CoreTrace Software Intelligence (CSI) service. Administrators receive intelligence about installed and requested applications, including prevalence, usage, and "application assurance" information on both "known good" and "known bad" (malware) applications.
Another marquee feature of 6.0 is intuitive, transparent administration that is built upon CoreTrace Trusted Change technology. CoreTrace has added options for user privileges called BlockQ and AllowQ. When attempting to run an application that has not been previously approved or automatically authorized via other Trusted Change mechanisms, designated BlockQ users receive a notification that prompts them to provide a simple business justification for the application. Designated AllowQ users receive a similar notification, but they have the ability to temporarily run the application until IT can approve or deny adding it to the whitelist. These two new flexible user models facilitate easy installations and requests that drop right into a queue for administrators to approve or reject at will. Combined with a broad set of application intelligence tools, IT and security administrators can make more informed decisions and more easily manage the constantly-changing application needs of an enterprise endpoint.
Though whitelisting has long shown great potential, it may now be entering a new phase of maturity as leaders such as CoreTrace match its power to contain risk with the expanded ability to adapt to the realities of enterprise management, said Scott Crawford, Research Director for Enterprise Management Associates. By taking the bull by the horns and integrating adaptive change control directly into BOUNCER, CoreTrace expands its leadership stake in defining trusted change for applications.
Additional features of BOUNCER 6.0 by CoreTrace also include:
Advanced security including memory protection, script controls, malware removal and self-defending endpoints.
Improved deployment and scalability - shipping as a virtual appliance, and utilizing industry-standard architectural and open source components.
Improved integration capabilities - addition of a client API to facilitate easier integrations into third party management systems.
BOUNCER 6.0 will ship in August 2010. Pricing starts at $35 per desktop.
CoreTrace' is the leading provider of secure and flexible application whitelisting solutions. The companys award-winning and patented BOUNCER solution is at the forefront of the movement in next-generation endpoint control and security solutions. Unlike other application whitelisting solutions that are simply lockdown technologies, BOUNCERs Trusted Change capability enables IT professionals to predefine multiple sources from which users can safely install applications and have them automatically added to the whitelistall with minimal IT involvement. The result: full prevention of unauthorized applications, improved overall security, and lower total cost of ownership. CoreTraces customers include organizations in a wide variety of industries, such as energy, oil and gas, retail, financial services, telecommunications, as well as government agencies.
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.Subscribe