The right combination of control and insight

The right combination of threat detection, control, and insight

SecureAPlus keeps your applications secure. Powered by an intelligent AI engine it offers multiple layers of defence and can be managed by a centralised dashboard. Used in tandem with various cloud anti-virus scanners it protects and informs enterprises of all sizes without interfering with existing systems or employee processes.

AI-powered endpoint application control

  • 100% threat
    protection
    100% threat protection}
    100% threat protection

    Using a block-first and deny-by-default approach, SecureAPlus detects security threats that fall outside the 99% detection rate (perceived as the best malware detector rate on the market). Traditional software solutions have to deal with the unknown, while SecureAPlus Application Control simply focuses on the known.

  • Control using allow-list
    Control using allow-list}
    Control using allow-list

    Each endpoint automatically constructs its own allow-list with no administrator or user involvement. Once built, new, authorised software is automatically added. Central control provides the administrator with oversight tools that enable tight controls over which processes are authorised.

  • Fileless attack
    prevention
    Fileless attack}
    Fileless attack prevention

    SecureAPlus uses machine learning to overcome advanced persistent threats including fileless attacks. Application Control prevents malicious scripts and macros from executing. Unseen and suspicious mutated malware variants that are usually undetectable can be prevented. 

  • Layered endpoint security
    Layered endpoint security}
    Layered endpoint security

    In addition to application control, SecureAPlus uses multiple cloud engines in tandem with AI, an online AV platform, AND a centralised management server. This approach automates almost all endpoint protection while equipping administrators with all the necessary insight, along with recommended actions to either quarantine, delete, block or trust.

  • Vulnerability
    assessment
    Vulnerability assessment}
    Vulnerability assessment

    The Security Management Server can determine the extent of vulnerability that your organisation faces. This is based on the number of endpoints that have detected known vulnerabilities in applications, providing suggested resolutions and resources.

100% threat protection}
100% threat protection

Using a block-first and deny-by-default approach, SecureAPlus detects security threats that fall outside the 99% detection rate (perceived as the best malware detector rate on the market). Traditional software solutions have to deal with the unknown, while SecureAPlus Application Control simply focuses on the known.

Control using allow-list}
Control using allow-list

Each endpoint automatically constructs its own allow-list with no administrator or user involvement. Once built, new, authorised software is automatically added. Central control provides the administrator with oversight tools that enable tight controls over which processes are authorised.

Fileless attack}
Fileless attack prevention

SecureAPlus uses machine learning to overcome advanced persistent threats including fileless attacks. Application Control prevents malicious scripts and macros from executing. Unseen and suspicious mutated malware variants that are usually undetectable can be prevented. 

Layered endpoint security}
Layered endpoint security

In addition to application control, SecureAPlus uses multiple cloud engines in tandem with AI, an online AV platform, AND a centralised management server. This approach automates almost all endpoint protection while equipping administrators with all the necessary insight, along with recommended actions to either quarantine, delete, block or trust.

Vulnerability assessment}
Vulnerability assessment

The Security Management Server can determine the extent of vulnerability that your organisation faces. This is based on the number of endpoints that have detected known vulnerabilities in applications, providing suggested resolutions and resources.

Manage your security operations on-premise or
online with our centralised dashboard

  • On-premise
    For an increased level of security and privacy, our on-premise option is the way to go. It allows Data to be stored locally within your organisation’s infrastructure and managed centrally with our Security Management Server (SMS).
    Security policies
    Security policies

    Not every endpoint needs the same level of security so with the SMS you can configure how SecureAPlus runs. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

    Audit logs
    Audit logs

    The SMS makes it possible to keep a record of all security events on your endpoints and allows administrators immediate access to the logs for further insight. This includes forensic analysis and historical trace.

    Users and roles
    Users and roles

    With the SMS you can create multiple users and groups with varying security access rights. This ensures that only your security management team has access.

    Allow & deny list
    Allow & deny list

    The SMS allows you to create and manage a global, or individual, allow and deny* lists. Administrators can approve or reject requests to add non-trusted applications to the universal lists.

    * Deny lists are only available in mid-2021.

    Software and file inventory
    Software and file inventory
    With the SMS you can access a running list of the applications that are installed on your endpoints and gain insights on the level of usage of a particular application within the organisation.
  • Online
    For those looking to double down on convenience, our scalable online portal provides centralised access to security management anytime, and anywhere - no hardware required.
    Security policies
    Security policies

    Not every endpoint needs the same level of security so with the online Portal you can configure how SecureAPlus runs. For instance, you can create a policy as a default for your entire organization, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

    Central allow list
    Central allow list

    Every endpoint’s allow list is unique but if you already know you trust certain applications or files, the Portal lets you easily define which ones to trust without overwriting an endpoint’s unique whitelist.

    Remote application control
    Remote application control

    Non-privileged users can request for non-trusted applications or files to run. Investigate, allow, or deny these requests through the Portal, anytime and anywhere.

For an increased level of security and privacy, our on-premise option is the way to go. It allows Data to be stored locally within your organisation’s infrastructure and managed centrally with our Security Management Server (SMS).
  • Security policies
    Security policies
    Security policies

    Not every endpoint needs the same level of security so with the SMS you can configure how SecureAPlus runs. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

  • Audit logs
    Audit logs
    Audit logs

    The SMS makes it possible to keep a record of all security events on your endpoints and allows administrators immediate access to the logs for further insight. This includes forensic analysis and historical trace.

  • Users and roles
    Users and roles
    Users and roles

    With the SMS you can create multiple users and groups with varying security access rights. This ensures that only your security management team has access.

  • Allow & deny list
    Allow & deny list
    Allow & deny list

    The SMS allows you to create and manage a global, or individual, allow and deny* lists. Administrators can approve or reject requests to add non-trusted applications to the universal lists.

    * Deny lists are only available in mid-2021.

  • Software and file inventory
    Software and file inventory
    Software and file inventory
    With the SMS you can access a running list of the applications that are installed on your endpoints and gain insights on the level of usage of a particular application within the organisation.
Security policies
Security policies

Not every endpoint needs the same level of security so with the SMS you can configure how SecureAPlus runs. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

Audit logs
Audit logs

The SMS makes it possible to keep a record of all security events on your endpoints and allows administrators immediate access to the logs for further insight. This includes forensic analysis and historical trace.

Users and roles
Users and roles

With the SMS you can create multiple users and groups with varying security access rights. This ensures that only your security management team has access.

Allow & deny list
Allow & deny list

The SMS allows you to create and manage a global, or individual, allow and deny* lists. Administrators can approve or reject requests to add non-trusted applications to the universal lists.

* Deny lists are only available in mid-2021.

Software and file inventory
Software and file inventory
With the SMS you can access a running list of the applications that are installed on your endpoints and gain insights on the level of usage of a particular application within the organisation.
For those looking to double down on convenience, our scalable online portal provides centralised access to security management anytime, and anywhere - no hardware required.
  • Security policies
    Security policies
    Security policies

    Not every endpoint needs the same level of security so with the online Portal you can configure how SecureAPlus runs. For instance, you can create a policy as a default for your entire organization, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

  • Central allow list
    Central allow list
    Central allow list

    Every endpoint’s allow list is unique but if you already know you trust certain applications or files, the Portal lets you easily define which ones to trust without overwriting an endpoint’s unique whitelist.

  • Remote application control
    Remote application control
    Remote application control

    Non-privileged users can request for non-trusted applications or files to run. Investigate, allow, or deny these requests through the Portal, anytime and anywhere.

Security policies
Security policies

Not every endpoint needs the same level of security so with the online Portal you can configure how SecureAPlus runs. For instance, you can create a policy as a default for your entire organization, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

Central allow list
Central allow list

Every endpoint’s allow list is unique but if you already know you trust certain applications or files, the Portal lets you easily define which ones to trust without overwriting an endpoint’s unique whitelist.

Remote application control
Remote application control

Non-privileged users can request for non-trusted applications or files to run. Investigate, allow, or deny these requests through the Portal, anytime and anywhere.

Want more information on SecureAPlus?

Frequently asked questions about our
endpoint application control

How is SecureAPlus different from a standard anti-virus solution?

Traditional anti-virus solutions require a constantly updated deny list of known threats – a bit like driving with your rear-view window. SecureAPlus uses the power of AI to create a personalised allow-list which will deny both known and unknown threats. When the AI is in doubt, rather than deny by default, which can have unintended consequences, it will alert the user rather than make a decision, giving 100% protection.

What is the difference between SecureAPlus and EDR solutions?
Endpoint Detection & Response (EDR) solutions assume that your endpoint protection solutions will fail due to design or human error. EDR solutions focus on real-time monitoring and Data analytics to identify failure points and either attempt to remediate them directly or provide context towards a remediation after the fact.
 
SecureAPlus proactively identifies and prevents threats before they are executed and can be complemented by EDR solutions for analytics, monitoring, and reporting whenever remediation is necessary.
How much time do I need to spend managing the "Allow List"?
None at all. The allow list is created automatically when you install SecureAPlus. Once generated, any process which attempts to execute, but which is not on the list, will be blocked. As an administrator you can control how new processes are automatically added to the list. For example, by default any properly signed code with a trusted certificate will automatically be added.
What languages are available for SecureAPlus?

Chinese (Traditional and Simplified), English, French, German, Hungarian, Indonesian, Italian, Japanese, Polish, Russian, Turkish, Vietnamese

Can't find your language? You can drop us an email if you are interested to help us with the translation.

What if a user is blocked from running some new, required software?
The user can request that the software is added to the Allow List by the administrator simply by clicking a button on the "blocked process" message. However, this is an uncommon event since almost all legitimate software will be code-signed.
Does SecureAPlus protect against non-file or app based attacks (i.e fileless attacks)?

Yes. One of the biggest advantages of SecureAPlus is that it protects against non-file-based threats that use scripts and command lines to deliver a malware payload.

Does SecureAPlus control removable devices?
Yes. In addition to being able to scan a removable device on insertion, SecureAPlus enables Read and/or Write controls plus the ability to allow specific removable devices while blocking all others.
How does SecureAPlus manage privileged and non-privileged users/groups/devices?

You can create and manage users, groups, and devices (individual or groups) via the Security Management Server feature. Non-privileged users are typically set on the highest security mode (Lockdown) but you can also create security policies at various levels of strictness for certain devices or groups within your organisation.

How can I manage the security of multiple endpoints remotely?

SecureAPlus comes with a feature called Security Management Server (SMS) which can manage your endpoints either on-premise or over the cloud.

What are the system requirements for SecureAPlus?

If you're running Windows 10 and purchased your device over the last 10 years, it is compatible with SecureAPlus. 

Despite having a bunch of useful features, we leverage cutting-edge technology including the cloud to minimize our digital footprint. This ensures compatibility even with old hardware while retaining tip-top performance.

Hardware requirements:
- 2 GHz Pentium 4 or higher processor
- 1GB of RAM or as recommended by the Windows OS whichever is higher
- 300 MB hard disk free space or more
- Local hard disk that is formatted with NTFS file system
- Minimum screen resolution: 1024×768 (At 100% Scale)

Supporting operating systems:
- Windows 11 (64-bit)
- Windows 10 (32-bit and 64-bit)
- Windows 8.1 (32-bit and 64-bit)
- Windows 8 (32-bit and 64-bit)
- Windows 7 Home Basic and above (32-bit and 64-bit) with Service Pack 1
- Windows Server 2022
- Windows Server 2019 (64-bit)
- Windows Server 2016 (64-bit)
- Windows Server 2012 R2 (64-bit)
- Windows Server 2012 (64-bit)
- Windows Server 2008 R2 and above (64-bit)
wave wave wave wave wave

See the difference our endpoint protection platform can make

Protect up to 50 enterprise endpoints with a 90-day trial of SecureAPlus
Educational institutes and nonprofits are eligible for a Grant

Our website uses cookies to ensure you get the best experience and can find what you need. Read our cookie policy