This article covers frequently asked questions about Appliction Control from our customers.
If you questions about billing. please sign in and continue with this link.
What is Application Control?
Application Control (also called whitelisting) is a security measure that only allows approved software to run on your computers. Everything else is automatically blocked.
Think of it like a guest list for your company’s devices — only trusted programs are allowed in, and everything else is turned away at the door.
Why do we need this if we already have antivirus?
Great question — antivirus reacts after something bad happens, like a bouncer chasing someone out after they’ve already gotten inside.
Application Control stops threats before they can even get through the door. It blocks unknown or suspicious software from running, even if someone accidentally downloads it.
It’s not a replacement for antivirus — it’s an extra layer that prevents more things from going wrong in the first place.
How is this different from removing admin rights?
Removing admin rights stops people from installing software.
Application Control stops software from running — even if it doesn’t need admin access.
That’s important because many modern attacks don’t need admin rights to do damage. Application Control gives you a stronger safety net.
What kinds of threats does it stop?
It blocks:
-
Ransomware, including brand-new variants
-
Dodgy downloads from phishing emails
-
Unapproved tools like remote access tools, crypto miners, or cracked software
-
Scripts or programs that sneak in without needing admin access
In real-world terms, Application Control can block around 80 to 90% of the techniques used in cyberattacks against devices, especially the ones attackers use in the early stages of an intrusion.
Does this mean staff can’t install anything?
Correct — and that’s by design. But don’t worry — there’s a simple process in place for requesting legitimate software.
We’ll work with you to ensure the tools your team needs are approved from day one. If something new comes up, it can be requested and reviewed quickly.
Isn’t this going to slow people down?
At the start, there may be a small adjustment period while we fine-tune what’s allowed.
But once set up, it runs quietly in the background. Most staff won’t notice it unless they try to run something unapproved. The short-term admin is well worth the long-term protection.
What happens when someone tries to run something blocked?
They’ll see a message letting them know the app isn’t approved.
From there, they can submit a request, or we’ll be notified to review it. We will contact our main contact person and request approval. Once its approced, we will
Do we need this even if we're a small or mid-sized business?
Yes — especially so. Smaller businesses are often targeted precisely because attackers think you’re an easy target. Generally speaking, Application Control is also much easier to deploy in small busienss as small businesses might run 150 pieces of software, while a large enterprise can run 10,000+.
Will it help with compliance or security audits?
Yes — Application Control plays a key role in many recognised cybersecurity frameworks and is strongly recommended as part of a well-rounded security posture.
It’s one of the core requirements in the Australian Cyber Security Centre’s “Essential Eight”, and it directly aligns with Control 2 of the CIS Critical Security Controls (CIS18) — which focuses on actively managing software and controlling what’s allowed to run in your environment.
From a compliance and audit perspective, it also provides:
-
Evidence of proactive risk management
-
Support for meeting insurer, regulatory, or funding body expectations
-
A clear demonstration that your organisation is limiting unauthorised or risky software execution
By reducing your attack surface and showing that you’re enforcing policy-based controls, Application Control can be a valuable asset in meeting modern cyber assurance standards.
So what’s the bottom line?
-
It keeps untrusted software out
-
It gives you control over what’s running in your environment
-
It significantly reduces your risk of ransomware and other attacks
-
It’s straightforward to manage once in place
-
And it’s one of the most effective ways to improve your cybersecurity posture
Still have questions?
We’re always happy to talk through how Application Control will work in your environment.
Please reach out if you’d like to discuss this further or have any questions.
Comments
0 comments
Please sign in to leave a comment.