
Guides and eBooks
Microsoft Change Compendium
Insights, articles and resources on major updates in Microsoft's programs and licensing agreements and channel strategy.
Airlock Digital delivers forward thinking endpoint protection that enables organisations to implement rapid, scalable allowlisting and execution control. Partners can provide unparalleled control over which applications are allowed to run on a system, preventing malware and other malicious code from executing. Airlock Digital’s solution is highly flexible, with support for Windows, Linux, and MacOS systems, and it can be easily integrated with existing security infrastructure. Additionally, Airlock Digital’s focus on secure software development and continuous monitoring means that partners can give their customers confidence that their applications are protected from the latest threats. Through first-hand understanding of the operational challenges in cybersecurity, intimate industry experience and an intuitive solution set, Airlock Digital is positioned as the leading, commercial allowlisting vendor worldwide.
Thank you for submitting your details! A member of our team will be in touch soon.
Create and manage secure allowlists in dynamically changing computing environments. Proactively prevent malicious code from running, before any damage occurs, using intuitive workflows, instead of large and hard to manage ‘firewall style’ rulesets.
Airlock provides centralised visibility over all files within an organisation. Discover when a file was first seen in an environment, where it came from and how it was executed.
The Airlock Digital Enforcement Agent is lean, with small policy sizes and minimal impact on endpoint resources across Windows, Linux and macOS.
The addition of Airlock Digital to the Crayon security solutions portfolio provides partners with the ability to provide world class allowlisting solutions to their customers.
Together, Crayon and Airlock Digital can provide and end-to-end service to start, develop or add more value to your existing catalogue.
Implementation time between customers vary, however many customers implement the solution, including the enablement of enforcement mode in 4-8 weeks. The major factors that influence this timeframe are how standardised software within the customers environment is and how often an administrator tunes policy within the solution.
The Airlock Enforcement Agent currently supports enforcement of allowlisting on the following operating systems:
Microsoft Windows
Linux
macOS
Airlock Digital prioritizes compliance against The Australian Cyber Security Centre Essential Eight Mitigation Strategies and is committed to making changes to the solution as the requirements change. The Airlock platform is tailored to help customers achieve Maturity Level 3 for Application Control.
For external logging of all platform data in real-time, Airlock integrates with: Splunk, Graylog, SumoLogic, Common Event Format (CEF) (Qradar,) Generic Syslog, Local JSON File
Airlock has the capability of exporting most data within the platform to common formats like .CSV & .XML
Handling scenarios where new applications are being introduced and/or a user wants to run something that’s currently getting blocked is essential to a successful Allowlisting implementation.
Airlock incorporates a One Time Pad (OTP) functionality which handles these exceptions through a time-based audit mode (can be Self Serviced and/or through a service desk workflow). During this session, one can run unapproved files. After the code expires/is revoked, the device goes back to the original policy. The Airlock admin can then review what the user ran during this session and make Allowlist updates if required.
Delivering competitive differentiation, new revenue streams, and enhanced Essential 8 compliance outcomes for MSPs and their customers.
Read on to find out how a leading Australian Managed Service Provider achieved Essential 8 compliance using Airlock Digital.
Guides and eBooks
Insights, articles and resources on major updates in Microsoft's programs and licensing agreements and channel strategy.
Insights
We explore the evolution of Microsoft's channel strategy over the past ten years, and what can be learned by viewing it through a Value Cycle lens.
Blogs
SMBs are on the hunt for intelligent, resilient and secure Field Service solutions. Explore a stack solution that meets all their needs!
Press Release
Two global software and cloud leaders unite.
Technical
Explore a modern stack solution that combines backup, storage, and identity controls within a scalable hybrid cloud framework.
Business
If your SMB customers are prioritising Customer Experience improvements, this article is for you!
Insights
SMBs in APAC are ramping up adoption of cloud-based business applications. Find out why and how this influences the services and capabilities sought from their trusted IT service partners.
Insights
Deliver data-driven value with Power BI and harness the growing SMB customer demand for data analytics and visualisation.
Insights
Solution adoption intent for Zero Trust is surging with SMBs across the region. Explore how Trend Micro can help partners respond.
Insights
Explore how SMBs in APAC are leveraging cybersecurity solutions and AI technologies toward achieving critical business objectives.
Insights
Rhonda Robati, Executive Vice President of Crayon APAC assesses the factors driving Microsoft's channel strategy and the evolution needed to be a Partner of the Future.
Blogs
After decades of experience navigating seismic shifts in vendor strategy, Warren Nolan knows the importance of being pragmatic and proactive in the face of disruption to the Microsoft CSP Program.
Guides and eBooks
The Microsoft Fabric Partner Guide curates our recent articles, videos and resources to accelerate Crayon partner learning.
Podcast
Is high-performance more than just a buzzword? Find out as Dr. Joe explores the importance and impact of internal culture with his guests.
Guides and eBooks
Partners, get your Bond on! Our Cyber Operatives Field Guide breaks down five cybersecurity missions to foil would-be cybercriminals.
Webinars Series
How do security assessments empower your cybersecurity practice to respond to the rise of AI? Find out!
Podcast
Cybersecurity experts from Crayon, SMX and Red Sift cover the realities of the complex threat landscape and how partners can respond.
Blogs
Crayon cloud security assessments help partners lock down M365 and Azure environments and build profitable cybersecurity practices. Learn how.
If you want to learn more about emerging ERP opportunities, download Crayon’s eBook
What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!
Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.