INTEL® SGX INTEGRATED PROACTIVE ENDPOINT PROTECTION TOOL THAT PAIRS WITH EXISTING REACTIVE SECURITY SOLUTIONs

user Profile
and System data

 

AppMoat® runs non-trusted code with temporary credentials that cannot access real user profile data, documents, or system files.

MAPPED
NETWORK DRIVES

 

AppMoat® runs non-trusted code with temporary credentials that cannot access shared network resources such as mapped drives.

USB
FILE SYSTEMS

 

AppMoat® runs non-trusted code with temporary credentials that cannot access USB file systems.

EMAIL CONTACTS /
Password KEYCHAINS

 

AppMoat runs non-trusted code with temporary credentials that cannot access email contacts, stored passwords, or other private data.

AppMoat® runs new or modified software on-the-fly within a temporary container using alternate credentials.

NEW APPS RUN INSTANTLY WITH LIMITED ACCESS

HOW APPMOAT WORKS

AppMoat® can fully protect an enterprise endpoint without blocking software from running instantly on devices.

 

AppMoat® is the only tool short of process virtualization that can prevent a rogue program from stealing/inheriting the credentials of the authenticated user.

The Automated Enterprise Safety Net

Real-Time

SafeLook® accounts are generated on-the-fly.

Limited Access

SafeLook® accounts have limited access.

Clean Reboot

SafeLook® accounts reset at reboot.

App Settings

Application settings are preserved.

Executable content is scrubbed when the process exits.

Sanitization

App Data

Saved content is moved to the desktop after sanitization.

PREVENT RANSOMWARE AND ZERO-DAY THREATS ON Windows® ENDPOINTS AND SERVERS

PROCESS CHART

Features and benefits depend on system configuration and may require specific hardware, software, or service activation. On-the-fly sandboxing requires NTFS Filesystem; Intel® SGX capability requires compatible hardware.

 

AppMoat is registered trademark of Seventh Knight Incorporated. All rights reserved. Intel, the Intel logo, SGX, and others are trademarks of Intel® Corporation in the United States and/or other countries. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners.

 

U.S. Patent No. 7,624,439 for “Authenticating Resource Requests in a Computer System”

U.S. Patent No. 7,149,800 for “Auditing Computer Systems Components in a Network”

U.S. Patent No. 7,685,174 for “Automatic Regeneration of Computer Files”

APPMOAT

STEP-BY-STEP VIDEO

Runtime 19:37

AppMoat Security with Intel | RSA 2018

Runtime 9:32

Presentation PDF

PDF version of the PPT shown in the AppMoat®/ Intel®/RSA 2018 video

Product Brochure

User Guide

PDF version of printed 3-Fold AppMoat Product Brochure

PDF version of the AppMoat User Guide

CONTACT US FOR MORE INFORMATION ABOUT APPMOAT

Sending Message to Seventh Knight

The server encountered an error. Please try again.

Thank you. Your Message Has Been Sent.

© 2018 Seventh Knight Inc.  All rights reserved.

AppMoat runs non-trusted code with temporary credentials that cannot access real user profile data, documents, or system files.

AppMoat runs non-trusted code with temporary credentials that cannot access shared network resources such as mapped drives.

AppMoat runs non-trusted code with temporary credentials that cannot access USB file systems.

ROTATE DEVICE TO VIEW PROCESS CHART