CatchPulse Pro keeps your endpoints and applications secure

CatchPulse Pro keeps your endpoints and applications secure

Powered by an intelligent AI engine CatchPulse Pro offers the right combination of detection, control, and insight. Used in tandem with various cloud anti-virus scanners and governed by a centralized dashboard, CatchPulse Pro protects enterprises’ endpoints of all sizes without interfering with existing systems or employee processes.

Governed by a centralised dashboard, supported by multiple cloud AV scanners and powered by an intelligent AI engine, CatchPulse Pro is always-on, catching unknown threats in real-time. CatchPulse Pro informs as it protects, serving as a trusted guide to non-cybersecurity experts and an informative ally for those who want high-level security insight.

AI-powered endpoint protection platform

  • Complete Endpoint Protection
    in two modes
    Complete Protection in two modes}
    Complete Protection in two modes
    With Auto-Protect ON, the CatchPulse AI is in charge and along with the third-party anti-viral scanners, selects the best course of action for you when faced with a potential threat. Turning Auto-Protect OFF gives the user full control over what is allowed to run on the endpoints – every decision is yours to make (our AI will help with details on the severity and recommended actions).

    The CatchPulse AI has an award-winning detection rate for the most advanced threats – so consistent and good in fact that we were invited to join VirusTotal in 2019. Our AI even includes data streams from multiple cloud-based anti-viral engines, many of which you know and may already be using. It’s time to consolidate and upgrade.
  • Block-first with
    Application Control
    Block-first with application control}
    Block-first with Application Control
    No AI or anti-virus or even combination of anti-viruses guarantees 100% detection, 100% of the time, instead CatchPulse Pro offers the next best thing - a “deny by default” approach based on application control.

    When installed, each endpoint automatically constructs its own allow-list. The CatchPulse Pro administrator then has oversight tools enabling tight controls over which new processes are authorized and added to endpoint-specific allow-lists.
  • Advanced, Persistent
    Threat protection
    Advanced, Persistent Threat protection}
    Advanced, persistent threat protection
    In addition to complete endpoint protection from malware through the combination of AI and application control, CatchPulse Pro is also able to overcome advanced persistent threats including fileless attacks by preventing malicious scripts, macros, and mutated malware variants.
  • Vulnerability Assessment
    Vulnerability Assessment}
    Vulnerability Assessment
    The CatchPulse Pro administrator dashboard can also determine the extent of application vulnerability the organisation faces based on the specific applications installed on every endpoint.
Complete Protection in two modes}
Complete Protection in two modes
With Auto-Protect ON, the CatchPulse AI is in charge and along with the third-party anti-viral scanners, selects the best course of action for you when faced with a potential threat. Turning Auto-Protect OFF gives the user full control over what is allowed to run on the endpoints – every decision is yours to make (our AI will help with details on the severity and recommended actions).

The CatchPulse AI has an award-winning detection rate for the most advanced threats – so consistent and good in fact that we were invited to join VirusTotal in 2019. Our AI even includes data streams from multiple cloud-based anti-viral engines, many of which you know and may already be using. It’s time to consolidate and upgrade.
Block-first with application control}
Block-first with Application Control
No AI or anti-virus or even combination of anti-viruses guarantees 100% detection, 100% of the time, instead CatchPulse Pro offers the next best thing - a “deny by default” approach based on application control.

When installed, each endpoint automatically constructs its own allow-list. The CatchPulse Pro administrator then has oversight tools enabling tight controls over which new processes are authorized and added to endpoint-specific allow-lists.
Advanced, Persistent Threat protection}
Advanced, persistent threat protection
In addition to complete endpoint protection from malware through the combination of AI and application control, CatchPulse Pro is also able to overcome advanced persistent threats including fileless attacks by preventing malicious scripts, macros, and mutated malware variants.
Vulnerability Assessment}
Vulnerability Assessment
The CatchPulse Pro administrator dashboard can also determine the extent of application vulnerability the organisation faces based on the specific applications installed on every endpoint.

Manage CatchPulse Pro on-premise or online

  • On-premise
    For an increased level of security and privacy, our on-premise option is the way to go. It allows Data to be stored locally within your organisation’s infrastructure and managed centrally with our Security Management Server (SMS).
    Security policies
    Security policies
    Not every endpoint needs the same level of security so with the SMS you can configure how CatchPulse Pro runs. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.
    Audit logs
    Audit logs
    The SMS makes it possible to keep a record of all security events on your endpoints and allows administrators immediate access to the logs for further insight. This includes forensic analysis and historical trace.
    Users and roles
    Users and roles
    With the SMS you can create multiple users and groups with varying security access rights. This ensures that only your security management team has access.
    Allow & deny list
    Allow & deny list
    The SMS allows you to create and manage a global, or individual, allow and deny* lists. Administrators can approve or reject requests to add non-trusted applications to the universal lists.
    * Deny lists are only available in late-2022.
    Software and file inventory
    Software and file inventory
    With the SMS you can access a running list of the applications that are installed on your endpoints and gain insights on the level of usage of a particular application within the organisation.
  • Online
    For those looking to double down on convenience, our scalable online portal provides centralised access to security management anytime, and anywhere - no hardware required.
    Security policies
    Security policies
    Not every endpoint needs the same level of security so with the online portal you can configure how CatchPulse runs. For instance, you can create a policy as a default for your entire organization, create a tighter one for R&D or finance, and set a flexible one for your marketing team.
    Central allow list
    Central allow list
    Every endpoint’s allow list is unique but if you already know you trust certain applications or files, the portal lets you easily define which ones to trust without overwriting an endpoint’s unique whitelist.
    Remote application control
    Remote application control
    Non-privileged users can request for non-trusted applications or files to run. Investigate, allow, or deny these requests through the portal, anytime and anywhere.
For an increased level of security and privacy, our on-premise option is the way to go. It allows Data to be stored locally within your organisation’s infrastructure and managed centrally with our Security Management Server (SMS).
  • Security policies
    Security policies
    Security policies
    Not every endpoint needs the same level of security so with the SMS you can configure how CatchPulse Pro runs. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.
  • Audit logs
    Audit logs
    Audit logs
    The SMS makes it possible to keep a record of all security events on your endpoints and allows administrators immediate access to the logs for further insight. This includes forensic analysis and historical trace.
  • Users and roles
    Users and roles
    Users and roles
    With the SMS you can create multiple users and groups with varying security access rights. This ensures that only your security management team has access.
  • Allow & deny list
    Allow & deny list
    Allow & deny list
    The SMS allows you to create and manage a global, or individual, allow and deny* lists. Administrators can approve or reject requests to add non-trusted applications to the universal lists.
    * Deny lists are only available in late-2022.
  • Software and file inventory
    Software and file inventory
    Software and file inventory
    With the SMS you can access a running list of the applications that are installed on your endpoints and gain insights on the level of usage of a particular application within the organisation.
Security policies
Security policies
Not every endpoint needs the same level of security so with the SMS you can configure how CatchPulse Pro runs. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.
Audit logs
Audit logs
The SMS makes it possible to keep a record of all security events on your endpoints and allows administrators immediate access to the logs for further insight. This includes forensic analysis and historical trace.
Users and roles
Users and roles
With the SMS you can create multiple users and groups with varying security access rights. This ensures that only your security management team has access.
Allow & deny list
Allow & deny list
The SMS allows you to create and manage a global, or individual, allow and deny* lists. Administrators can approve or reject requests to add non-trusted applications to the universal lists.
* Deny lists are only available in late-2022.
Software and file inventory
Software and file inventory
With the SMS you can access a running list of the applications that are installed on your endpoints and gain insights on the level of usage of a particular application within the organisation.
For those looking to double down on convenience, our scalable online portal provides centralised access to security management anytime, and anywhere - no hardware required.
  • Security policies
    Security policies
    Security policies
    Not every endpoint needs the same level of security so with the online portal you can configure how CatchPulse runs. For instance, you can create a policy as a default for your entire organization, create a tighter one for R&D or finance, and set a flexible one for your marketing team.
  • Central allow list
    Central allow list
    Central allow list
    Every endpoint’s allow list is unique but if you already know you trust certain applications or files, the portal lets you easily define which ones to trust without overwriting an endpoint’s unique whitelist.
  • Remote application control
    Remote application control
    Remote application control
    Non-privileged users can request for non-trusted applications or files to run. Investigate, allow, or deny these requests through the portal, anytime and anywhere.
Security policies
Security policies
Not every endpoint needs the same level of security so with the online portal you can configure how CatchPulse runs. For instance, you can create a policy as a default for your entire organization, create a tighter one for R&D or finance, and set a flexible one for your marketing team.
Central allow list
Central allow list
Every endpoint’s allow list is unique but if you already know you trust certain applications or files, the portal lets you easily define which ones to trust without overwriting an endpoint’s unique whitelist.
Remote application control
Remote application control
Non-privileged users can request for non-trusted applications or files to run. Investigate, allow, or deny these requests through the portal, anytime and anywhere.

One simple plan for enterprise

How many devices do you have?

How long do you need?

60-day money back guarantee
CatchPulse Pro
$ 3.00
/month
Let’s talk
Billed as $36.00 /year
to enjoy exclusive pricing
AI-Powered Application Control
Cloud Anti-Virus
Offline AI Anti-Malware
Vulnerability Assessment
Security management via Portal
Security policy
Shared accounts
Advanced allowlist management
Digital asset management
Security event management
Prices are in USD and may be converted to your local currency upon checkout.
*Automatically renewed annually. Cancel any time. Terms & conditions apply.
CatchPulse
$ 2.25
/month
Billed as $27.00 /yearly
CatchPulse Pro
$ 2.83
/month
Let’s talk
Billed as $34.00 /year
to enjoy exclusive pricing
Compare with CatchPulse

Want more information on CatchPulse Pro?

Frequently asked questions about
our endpoint protection platform

What are the system requirements for CatchPulse Pro?
Hardware requirements
- 2 GHz Pentium 4 or higher processor
- 1GB of RAM or as recommended by the Windows OS whichever is higher
- 300 MB hard disk free space or more
- Local hard disk that is formatted with NTFS file system
- Minimum screen resolution: 1024×768 (At 100% Scale)

Version
Cilck here to see our full history

Supporting operating systems
- Windows 11 (64-bit)
- Windows 10 (32-bit and 64-bit)
- Windows 8.1 (32-bit and 64-bit)
- Windows 8 (32-bit and 64-bit)
- Windows 7 Home Basic and above (32-bit and 64-bit) with Service Pack 1
- Windows Server 2022
- Windows Server 2019 (64-bit)
- Windows Server 2016 (64-bit)
- Windows Server 2012 R2 (64-bit)
- Windows Server 2012 (64-bit)
- Windows Server 2008 R2 and above (64-bit)
How is CatchPulse Pro different from a standard anti-virus solution?
Traditional anti-virus solutions require a constantly updated denylist of known threats. CatchPulse Pro uses the power of AI to create a personalised allowlist that will deny both known and unknown threats. When the AI is in doubt, rather than denying by default, which can have unintended consequences, it will alert the user rather than make a decision on its own – this puts the user (not the AI or the malware) in total control.
What is the difference between CatchPulse Pro and EDR solutions?
Endpoint Detection & Response (EDR) solutions assume that your endpoint protection solutions will fail due to design or human error. EDR solutions focus on real-time monitoring and Data analytics to identify failure points and either attempt to remediate them directly or provide context towards remediation after the fact.

CatchPulse Pro proactively identifies and prevents threats before they are executed and can be complemented by EDR solutions for analytics, monitoring, and reporting whenever remediation is necessary.
How much time do I need to spend managing the "Allowlist"?
None at all. The allow list is created automatically when you install CatchPulse Pro. Once generated, any process which attempts to execute, but which is not on the list, will be blocked. As an administrator you can control how new processes are automatically added to the list. For example, by default any properly signed code with a trusted certificate will automatically be added.
How is CatchPulse Pro different from Windows Applocker and AppSamVid?
Unlike competing solutions that require a hands-on manual approach to creating and maintaining an allowlist, CatchPusle Pro automatically creates and maintains your device’s allowlist for you. It makes use of AI and cloud AVs to ensure that your baseline allowlist, and any future additions, do not contain any malware.
What if a user is blocked from running some new, required software?
The user can request that the software is added to the allowlist by the administrator simply by clicking a button on the "blocked process" message. However, this is an uncommon event since almost all legitimate software will be code-signed.
Does CatchPulse Pro control removable devices?
Yes. In addition to being able to scan a removable device on insertion, CatchPulse Pro enables Read and/or Write controls plus the ability to allow specific removable devices while blocking all others.
Does CatchPulse Pro protect against file-less or app-based attacks?
Yes. One of the biggest advantages of CatchPulse Pro is that it protects against non-file-based threats that use scripts and command lines to deliver a malware payload. CatchPulse Pro can also help spot exploitable applications with vulnerability scans and provides easy access to remediation resources online.
How does CatchPulse Pro manage privileged and non-privileged groups?
You can create and manage users, groups, and devices (individual or groups) via the Security Management Server. Non-privileged users are typically set on the highest security mode (Lockdown) but you can also create security policies at various levels of strictness for certain devices or groups within your organisation.
How can I manage the security of multiple endpoints remotely?
CatchPulse Pro works with the Security Management Server (SMS) which can manage your endpoints either on-premise or over the cloud (via a virtual machine).
wave wave wave wave wave

See the difference our endpoint protection platform can make

Our website uses cookies to ensure you get the best experience and can find what you need. Read our cookie policy