PC Matic's whitelist holds the keys to protection.

Behind the Scenes of PC Matic’s Patented Whitelisting Technology

Did you know PC Matic uses application whitelisting as it’s core method of malware detection?

What is Application Whitelisting?

To understanding what application whitelisting is, you must first understanding its alternative. Since the beginning of time {antivirus time, of course} the method companies would use to identify malware was called a blacklist. The blacklist, similar to NBC’s primetime television show, is a list of all bad software. Now, in the early days, keeping this updated with the latest bad applications was do-able. However, as cyber crime has skyrocketed, it is no longer a feasible approach.

But, why?

New applications are being created for malicious purposes every second. Literally, every second. Keeping an updated list of “bad software” is impossible.

Ten years ago, PC Matic founder and CEO, Rob Cheng became tired of the existing antivirus solutions on the market. He had created PC Matic and knew a blacklist approach was ineffective — because he tried it. So, alternatively, the whitelist concept came to fruition. The PC Matic team created a globally automated application whitelist, which is used as PC Matic’s primary method of malware detection.

What does this mean?

Contrary to the blacklist, a whitelist is a list of all known, and proven to be safe programs. This list is far more maintainable, and secure for the following reasons. First, in order for a program or application to be added to the whitelist, it is first tested by trained malware research professionals to ensure it is secure. If a it is not on the whitelist, it cannot run. Therefore, only tested and proven safe programs are going to be running on the device.

But isn’t that a lot of work — keeping a list of all the good files? Theoretically, yes. However, by using PC Matic’s patented approach, digital signatures are whitelisted, eliminating a bulk of the work. Again, what does this mean? Take Microsoft for example, every time they release a new update, they sign the software with their digital signature. As long as that signature is on the whitelist of approved signatures, it will be added to the whitelist automatically. But what if it’s bad, or someone changes it after it has been signed? If any changes are made, a new signature is required. This proactive approach to malware detection eliminates the victim approach. In order for a file to be known to be bad, and added to the blacklist, it would have had to infect someone first. I don’t know about you, but I don’t want to be that guinea pig.

#ApplicationWhitelistingMatters Movement

The concept of whitelisting significantly reduces the risk of falling victim to cyber crime. PC Matic as a company, and our customers know this — because they remain secure. Application whitelisting is the solution to the growing cyber attacks. The problem is, not everyone knows it or understands what it is. As a part of our #ApplicationWhitelistingMatters, we want to know…

What are your questions? Drop them in the comments and we will answer them all!

 599 total views,  3 views today

(Visited 1 times, 1 visits today)

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.