Blogs
Microsoft Ignite 2025: the ‘need-to-know’ highlights
Catch our comprehensive summary of the highlights from Microsoft Ignite 2025, combined with the resources and links you need to dig into the detail!

Airlock Digital delivers forward thinking endpoint protection that enables organisations to implement rapid, scalable allowlisting and execution control. Partners can provide unparalleled control over which applications are allowed to run on a system, preventing malware and other malicious code from executing. Airlock Digital’s solution is highly flexible, with support for Windows, Linux, and MacOS systems, and it can be easily integrated with existing security infrastructure. Additionally, Airlock Digital’s focus on secure software development and continuous monitoring means that partners can give their customers confidence that their applications are protected from the latest threats. Through first-hand understanding of the operational challenges in cybersecurity, intimate industry experience and an intuitive solution set, Airlock Digital is positioned as the leading, commercial allowlisting vendor worldwide.
Thank you for submitting your details! A member of our team will be in touch soon.
Create and manage secure allowlists in dynamically changing computing environments. Proactively prevent malicious code from running, before any damage occurs, using intuitive workflows, instead of large and hard to manage ‘firewall style’ rulesets.
Airlock provides centralised visibility over all files within an organisation. Discover when a file was first seen in an environment, where it came from and how it was executed.
The Airlock Digital Enforcement Agent is lean, with small policy sizes and minimal impact on endpoint resources across Windows, Linux and macOS.
The addition of Airlock Digital to the Crayon security solutions portfolio provides partners with the ability to provide world class allowlisting solutions to their customers.
Together, Crayon and Airlock Digital can provide and end-to-end service to start, develop or add more value to your existing catalogue.
Implementation time between customers vary, however many customers implement the solution, including the enablement of enforcement mode in 4-8 weeks. The major factors that influence this timeframe are how standardised software within the customers environment is and how often an administrator tunes policy within the solution.
The Airlock Enforcement Agent currently supports enforcement of allowlisting on the following operating systems:
Microsoft Windows
Linux
macOS
Airlock Digital prioritizes compliance against The Australian Cyber Security Centre Essential Eight Mitigation Strategies and is committed to making changes to the solution as the requirements change. The Airlock platform is tailored to help customers achieve Maturity Level 3 for Application Control.
For external logging of all platform data in real-time, Airlock integrates with: Splunk, Graylog, SumoLogic, Common Event Format (CEF) (Qradar,) Generic Syslog, Local JSON File
Airlock has the capability of exporting most data within the platform to common formats like .CSV & .XML
Handling scenarios where new applications are being introduced and/or a user wants to run something that’s currently getting blocked is essential to a successful Allowlisting implementation.
Airlock incorporates a One Time Pad (OTP) functionality which handles these exceptions through a time-based audit mode (can be Self Serviced and/or through a service desk workflow). During this session, one can run unapproved files. After the code expires/is revoked, the device goes back to the original policy. The Airlock admin can then review what the user ran during this session and make Allowlist updates if required.
Delivering competitive differentiation, new revenue streams, and enhanced Essential 8 compliance outcomes for MSPs and their customers.
Read on to find out how a leading Australian Managed Service Provider achieved Essential 8 compliance using Airlock Digital.
Blogs
Catch our comprehensive summary of the highlights from Microsoft Ignite 2025, combined with the resources and links you need to dig into the detail!
Training
In our latest webinar, our in-house Modern Work experts Jye Wong and Ksenia Turner will run you through a practical refresher on Solution Partner Designations; what they are, why they matter and how to get started.
Sales and Marketing
Business leaders don't live in the tools. They live in the outcomes. The metrics they care about most are not always limited to compliance and risk. So how do you connect data protection to the big-ticket objectives, when they're less obvious? Our in-house pre-sales expert, Michael Brooke explains.
Guides and eBooks
As SMBs mature in the Data Protection lifecycle, they need help to optimise spend, reduce the compliance burden and ensure results align to business objectives. The third installment of our Data Protection Playbook series provides practical guidance for partners on how to address emerging pressure and connect ongoing investment to measurable business value.
Training
Copilot Agents: what are they and how do they differ from AI assistants and chatbots? Our in-house Copilot expert Ksenia Turner explains the use cases and service opportunities for partners.
Blogs
Fragmented data protection systems and processes create compliance proof-gaps for SMB customers. Scott Hagenus, Director, Cybersecurity here at Crayon explains.
Guides and eBooks
How can partners help their SMB customers to move from silos of security and continuity to a more cohesive, measurable and insurable data protection framework? The second edition in our Data Protection Playbook series maps out their journey, and yours.
Sales and Marketing
Ever wonder why a pitch has some IT Managers leaning forward, while others glaze over? Michael Brooke, Cybersecurity Pre-Sales Lead offers some insight on how to tune your approach to chime with different technical mindsets.
Vendor Announcements
Copilot for Business has landed at Microsoft Ignite 2025, levelling the GenAI playing field for SMB customers. Learn all about it from our man on the ground, Andreas Bergman.
Press Release
Press Release
Blogs
As cybersecurity and continuity converge in platforms and in practice, partners need new playbooks to address modern Data Protection standards. Our in-house cybersecurity pre-sales lead, Michael Brooke explains why.
Guides and eBooks
What triggers an SMB customer to begin exploring their need for better Data Protection? The first of our four Data Protection Playbooks for partners breaks down how to position and win in the Pre-Adoption and Exploration stage.
Insights
Data Protection priorities are shifting for SMBs. Ramp up your ability to respond with curated insights, articles and resources to help you guide every customer conversation with confidence.
Partner Spotlight
In this Partner Spotlight, Acceltech Managing Director Ivy Tarrobago shares how Crayon’s responsive support enhances client outcomes and business growth.
Whitepapers
Data Protection is a must for all SMBs but how can partners align solution investment with critical business objectives? Our latest paper shows you how.
Press Release
Crayon has been recognised with a huge double win at the CRN Channel Asia awards ceremony.
Insights
All the latest insights, articles and resources on M365 Copilot, curated into one place.
Insights
SMB customers are storing greater volumes of sensitive data in more places than ever. Secure backup and recovery practices are essential to how they protect it.
Partner Spotlight
Bigfish Technology saved AU$20,000 on its annual Microsoft licensing after one call with Crayon and has since built a strong partnership that enabled Bigfish to get access to Crayon’s expertise and vendor ecosystem.
Insights
Insider risk is a subtle and continuous challenge for SMB customers. Turn it into a manageable and quantifiable aspect of their Data Protection strategy.
Blogs
From rethinking backup to governance frameworks and behavioural analytics, what's involved in building a complete Data Protection strategy for SMB customers?
Insights
We explore the evolution of Microsoft's channel strategy over the past ten years, and what can be learned by viewing it through a Value Cycle lens.
Guides and eBooks
The Microsoft Fabric Partner Guide curates our recent articles, videos and resources to accelerate Crayon partner learning.
Insights
Support your cybersecurity game plans with our top picks of new and updated risk and resilience resources.
Podcast
Is high-performance more than just a buzzword? Find out as Dr. Joe explores the importance and impact of internal culture with his guests.
Guides and eBooks
Partners, get your Bond on! Our Cyber Operatives Field Guide breaks down five cybersecurity missions to foil would-be cybercriminals.
Webinars Series
How do security assessments empower your cybersecurity practice to respond to the rise of AI? Find out!
Podcast
Cybersecurity experts from Crayon, SMX and Red Sift cover the realities of the complex threat landscape and how partners can respond.
Blogs
Crayon cloud security assessments help partners lock down M365 and Azure environments and build profitable cybersecurity practices. Learn how.

Connect Data Protection to strategic objectives via this Whitepaper

What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!

Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.