White Cloud Security

  • TAKE CONTROL USING ZERO-TRUST ENDPOINT PROTECTION
  • BLOCK RANSOMWARE INSTEAD OF REACTING TO IT

TRUST LOCKDOWN™

Only Runs Trusted Apps, Nothing Else!

 

You begin with our standard Trust-Lists for commonly used applications. Then you identify what else you want to allow, and add these Apps to your Trust-List.

We validate all executables and scripts at the kernel layer by comparing them to your Trusted Apps. 

Only Trusted Apps are Run. Everything else is blocked. Regardless of whether it was a phishing email, a malicious ad, website or USB drive, untrusted Apps never run.

Our Patented Handprint Identification technology stops hackers from passing off a malicious App or Script as a Trusted App. Our Handprint is more secure than a single hash and prevents the SHAttered Attack that fools application whitelisting. You can also add Code-Signing Certificate based validation to allow your Trusted Apps to update automatically.

Trust Lockdown™ – Stop Threats FIRST!

Prevention Beats Remediation Every Time

Because we focus on what you trust and want to run on your endpoints, we stop all unknowns by default. So unknown items such as new ransomware variants, advanced attacks, and zero-day exploits are stopped first by Trust Lockdown. Get out of the ‘Break-Fix’ cycle that is eating your time and budget.

Endpoint Protection with Trusted App Technology

Trust Lockdown is a malware PREVENTION product at the endpoint layer of your Defense In-Depth Security Strategy. We allow only your Trusted Apps to run.  Untrusted apps and scripts are ALWAYS blocked. It doesn’t matter if it has a new or unknown signature, what behavior it has, what the user privileges are, or if the item tries to download from a webpage or local drive. Unknown items are blocked, and your trusted items are able to run.

Back To Planned Work

We also eliminate the need to be patching your apps every day. With Trust Lockdown, you can do your application patches on a regular planned basis instead of urgent need basis, again giving you back your time and budget to be more productive.

Protect Offline Devices

Our protection also works when your device is offline! Whether you choose our cloud or appliance based service, our endpoint protection delivers the same protection when offline or disconnected from the network. An essential feature in today’s on-the-go environment and use of portable devices.

 

Cloud and Appliance Services

 Trust Lockdown™ meets the demands for different business models ranging from Small Business to Large Enterprise, and multi-site deployments. We offer two types of Cloud service and an Appliance service.

Enterprise Cloud Service

Our Enterprise Cloud Service provides a fully scalable solution for any size organization connected to the Internet, like any other cloud based service. Users can deploy and monitor all their endpoints from a single dashboard. Personalize your Trust List for all your endpoints at one time, and have unique Trust Lists for special groups. Add additional people to maintain your service, each with their own login.

Features:

  • Unlimited Users
  • Unlimited Groups
  • Robust multiple cybermetric fingerprint validation
  • Optional code-signing certificate validation
  • Validation of executables, scripts, and DLLs
  • Trust Apps directly from any endpoint
  • Trust Apps through other profiles
  • 1-Click Trust of known apps from other groups
  • Grant Advisor privileges or Admin privileges to other Users
  • Download history of allowed items
  • Download history of blocked items
  • Email notification of blocked items
  • Offline protection when disconnected from network
  • Selectable endpoint dialog in system tray
  • 1-Click online search of either blocked or allowed items
  • Learn Mode tool for adding new apps or updates to Trust List
  • No minimum Host count

Private Enterprise Cloud Service

Our Private Enterprise Cloud Service offers all the same functionality and features as the Enterprise Cloud Service, but within a Virtual Private Cloud environment, which may be necessary for your specific industry or organization.

Features:

  • Enterprise Cloud Service features, plus …
  • Virtual Private Cloud environment
  • Personalized Subdomain
  • Multi-Administrator Approval option to prevent “lone wolf” attacks by malicious insiders and administrators
  • 250 minimum Host count

Enterprise Virtual Appliance

Our Enterprise Virtual Appliance offers all the same functionality and features as the Enterprise Cloud Service in the form of a Virtual Appliance for your Data Center or Private Cloud.  It’s distributed as a virtual machine image that supports “horizontal scaling” for an on-premises or private cloud service.  It also provides service for networks where the use of the White Cloud Security SaaS services either (a) would be contrary to regulatory requirements, or (b) are inaccessible from the user’s network.

Features:

  • Enterprise Cloud Service features, plus …
  • Software based Virtual Appliance (appliance hardware not included)
  • Direct Database Access to the Service’s Trust Policy and Event Log records
  • Adjustable TTL (time-to-live) for App Trust Expiration
  • Multi-Administrator Approval option to prevent “lone wolf” attacks by malicious insiders and administrators
  • 500 minimum Host count

Technical Specifications

Endpoint Specifications

White Cloud Security protects Windows operating systems.
Trust-listing drivers will be added later for Mac OS X and mobile devices.

 

Windows Desktops and Laptops

Minimum Disk Space

Minimum RAM

     
 

Windows

White Cloud Security

Windows

White Cloud Security

Windows 10 (32-bit or 64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows 8 and 8.1 (32-bit or 64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows 7 (32-bit or 64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows Vista SP1 (32-bit or 64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows XP SP3 (32-bit only)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

NOTE:  Windows 7 64-bit, Windows 8 64-bit, and Windows 8.1 64-bit all require at least 2GB RAM.

 

Windows Servers

Minimum Disk Space

Minimum RAM

 

Windows

White Cloud Security

Windows

White Cloud Security

Windows Server 2019

1 GB

50 MB

2 GB 64-bit

30 MB

Windows Server 2016

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows Server 2012 R2 (64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows Server 2012 (64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows Server 2008 R2 (64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows Server 2008 (64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows Server 2003 R2 (32-bit or 64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

Windows Server 2003 (32-bit or 64-bit)

1 GB

50 MB

1 GB 32-bit, 2 GB 64-bit

30 MB

 

White Cloud Security protects Linux operating systems
using our Linux Security Module complied into the kernel.

 

Linux Operating Systems

Minimum Disk Space

Minimum RAM

     
 

Linux

White Cloud Security

Linux

White Cloud Security

RHEL/CentOS 8.0+
Linux Kernel Version 4.18.0-80+

6 GB

25 MB

2 GB

15 MB

RHEL/CentOS 7.5+
Linux Kernel Version 3.10.0-862+

6 GB

25 MB

2 GB

15 MB


NOTE:  Debian and Raspbian Linux 10+ (Buster) and Ubuntu 18.10+ available Q3 2021.

Debian 10+ (Buster)
Linux Kernel Version 4.19+

6 GB

25 MB

2 GB

15 MB

Raspbian 10+ (Buster) for Intel
Linux Kernel Version 4.19+

6 GB

25 MB

2 GB

15 MB

Ubuntu 18.10+ (Cosmic Cuttlefish)
Linux Kernel Version 4.18+

6 GB

25 MB

2 GB

15 MB