Features and Benefits
Bouncer protects valuable information and critical systems by ensuring that only authorized applications are allowed to execute. From the operating system kernel, Bouncer’s application whitelisting prevents any advanced threats that attempt to utilize deposited payloads and other malware.
Bouncer prevents attackers from exploiting the memory of whitelisted applications. Bouncer provides this benefit via an expanding list of memory protection capabilities, including the prevention of key exploits like skape/jt and reflective DLL injections.
Operating System Integrity
Bouncer provides protection against operating system tampering.
By preventing unauthorized applications and memory processes, Bouncer provides data and information protection far beyond traditional endpoint security solutions.
File Integrity Monitoring
Bouncer doesn’t report on change, it blocks it. If something attempts to change a file, Bouncer compares the hashes of the two files to ensure that your file is protected. This includes executable files as well as special-iuse files use as hymn and web files. Website defacements are halted using Bouncer’s file protection. These all serve to lower administrative efforts and costs and can help ensure compliance.
Software Reputation & Risk Profiling
CoreTrace Reputation Service (CRS) utilizes billions of known good and bad applications to determine the reputation / risk of installed software.