product-logo

Ivanti Application Control

See all products by this partner 

Ivanti Application Control is a preventative endpoint security solution, helping protect endpoints without compromising user experience. Using Ivanti Application Control, IT desktop and security teams can complement your defense-in-depth security strategy without the need for complex white and black list management. Ivanti Application control can protect Citrix delivered applications and desktops against ransomware and help meet regulatory compliance. Application control supports Windows applications, web based applications and windows store apps. Application control also removes the risk and cost associated with providing user administrative privileges helping stabilize and increase the adaption of Citrix deployments. Ivanti Application Control can also help organizations reduce the cost of licensing desktop applications such as Vision and Project in Citrix environments by enforcing and auditing on per connecting device use.

Request Information

Compatibility

  • down-arrow Citrix Virtual Apps
    7.6, 6.5
  • down-arrow Citrix ADC
    11.0 VPX, 11.0 MPX, 10.5 VPX, 10.5 MPX, 10.1 VPX, 10.1 MPX, 10.0 VPX, 10.0 MPX
  • down-arrow Citrix Virtual Desktops
    7.6

Product Details

Ivanti Application Control provides next generation endpoint security, helping protect endpoints without compromising user experience. Using Ivanti Application Manager, IT desktop and security teams can complement your defense-in-depth security strategy without the need for complex white and black list management.

Benefits

  • Ensure users have the rights they need to be productive, nothing more and nothing less
  • Prevent unknown executables from launching
  • Enforce user compliance and license control
  • Maintain gold images

How it Works

Ivanti Application Manager uses secure kernel-level filter drivers and NTFS security policies to incept all execution requests and block any unwanted applications. Entitlement is based on the ownership of the application with default ownership being Administrator. White and Black lists can also be used to specifically define permitted or prohibited applications.

Through this technique, current application access policy is immediately enforced without the need for scripting or list management. Outbound connection requests such as UNC paths and URLs are also managed by entitlement, providing one solution for all applications and resource entitlements.

Screenshots

screenshot

Features

  • Unique Trusted Ownership technology removing the need for complex whitelisting. 
  • Granular, elegant Windows rights elevation
  • On-demand change request management
  • Enterprise-grade change tracking and control
  • Contextual application entitlement
  • Application network access control
  • Software licensing control
  • Passive-mode monitoring
  • Integrated auditing events

Resources

Brochures: Executive Overview

Resource-iconApplication Manager (AM) Datasheet