Whitelisting Technology: The Solution to Malware Nightmares


As we’ve shared in our populating “Ransomware Attacks of 2016” blog, we’ve learned this year has caused a major concern among businesses and public sector organizations regarding malware attacks.

Ransomware has progressed to different forms and trends and has caused financial stress for numerous businesses.  Our solution to ridding systems sensitivities to these threats is by implementation of our whitelist technology. By bolstering our security experts’ process of reviewing additional factors of potential malware, we’ve added to the value we provide our customers and businesses by shifting the burden of security to PC Matic Home and PC Matic Pro.

There are numerous benefits to implementing whitelist technology. The most important benefit of whitelisting is the extra protection and security given to our customers. Ransomware is certainly a game-changer; although continuous decryptors are created in lieu of substandard protection, cyber criminals are creating new ways to bypass decryptors with advanced ransomware threats. PC Matic and PC Matic Pro’s security approach, now armed with our whitelist technology, blocks out threats like ransomware and CryptoLocker and prevents cyber thieves from holding your files for ransom.


Whitelisting: The only approach that stops Ransomware in its tracks.


An advantage of including whitelisting technology into your system’s protection is to put your mind at ease. Rather than waiting for the ransomware attack to happen and responding to the threat, protect your business and personal systems in real-time with the whitelisting approach.

Instead of using the archaic blacklist approach like our competitors, PC Matic and PC Matic Pro use a proprietary whitelisting technology for real-time protection against ransomware, advanced persistent threats (APTs), polymorphic viruses and zero-day attacks.

In a recent survey by IDG, 95% of IT security leaders would consider implementing whitelist security solutions. With that, 91% of IT pros would still consider whitelisting even if it means an occasional false positive application. IT security leaders know in a world of everyday cyber threats, it’s better to be safe than sorry when it comes to protecting sensitive information and systems.


USA today mentioned, “Utilize application ‘whitelisting’, which allows only specific programs to run on your computer. This will prevent malicious programs from running on your computer.”


PC Matic and PC Matic Pro products provide superior security protection over all security products, free or otherwise, on the market. In addition, PC Matic and PC Matic Pro keep your computers running at peak performance even after years of use.



 3,213 total views,  1 views today

(Visited 1 times, 1 visits today)

11 thoughts on “Whitelisting Technology: The Solution to Malware Nightmares”

  1. i keep getting a message super shield stopped C:\programs files (86)\Samsung\smart switch pc\language\resource_vi_

  2. I was wondering what your definition of lifetime is for purchasing your product. For I have a older computer that can go out within a year, but needs covered. Thanks.

    1. Kayla Thrailkill

      Our lifetime subscription is for your life, not the life of the PC. Say you have 5 PCs covered with your subscription, one dies and needs replaced. Upon purchase of your new PC, you simply can remove the license key from the PC no longer in use and use it on the new computer.

  3. TheOncomingStorm

    “Tech Sentry and PC Matic Security are the Only Products that Stop Ransomware with Whitelisting”

    umm, really? you’re honestly trying to say that these two products are the ONLY answer to this problem? HOW ABOUT NOT!

    there ARE other whitelisting antivirus programs out there, like kaspersky, bit9 parity suite, lumension application control, mcaffee application control, signacert and bouncer for example. not to mention windows itself is outfitted with onboard whitelisting security software called applocker.

    this “only products” bs is just generic marketing hype that you find in any infomercial.

    because of prior experiences, i have declined subscribing to comment notifications. in other words, don’t bother wasting your time commenting, i won’t read them.

    1. @TheOncomingStorm: The PC Matic/Tech Sentry Whitelist approach leverages several specific aspects in comparison to our competitors. First and foremost, our whitelist technology is a proactive-based security feature; which when compared to our competitors, their approach is overall reactive. Tech Sentry & PC Matic believe in preventing the problem from ever occurring, instead of comparatively putting all of the “eggs into one basket” when it comes to reacting after an infection occurs. Of course, Tech Sentry offers reactive detection as well, but we have out-performed all competitors with the use of our proactive whitelisting technology.

      In comparison to our competitors, Tech Sentry/PC Matic is differential in several major ways:
      • Proactive: Tech Sentry offers whitelist as a proactive detection tool.
      • Experienced: Tech Sentry Whitelist is far larger than that of any other competitor due to years of experience with this format of protection.
      • Convenient: Any blocked files are tested within 24 hours to minimize inconvenience.
      • Ease of implementation: Tech Sentry offers a simple implementation process with cross-platform access making security easy to deploy and manage.

  4. Whitelisting is already relatively simple to implement on a Windows domain using Group Policy, without having to pay for anything extra.

    I’m interested in the use of the term ‘occasional false positive’ in this article. I think most sysadmins will find that it certainly is not an occasional occurrence that something benign is not allowed through the whitelist and x y and z no longer works on the system. In fact if you read through the accounts of people that have implemented whitelisting you will see that it is an extremely time consuming policy and you need to assume that basically ‘everything’ will stop working, you’ll get about a million tickets into helpdesk and you’ll struggle for weeks or months to whitelist all the software your employees need (and all the additional software that the first software calls). Many organisations do not have the resources to dedicate to this approach that’s why many many sysadmins implement whitelisting and then have to turn it off after a week of chaos. How is Tech Sentry any different to this current status quo? I would hazard a guess that it isn’t.

    Of course whitelisting is a positive move but the industry still has some way to go with whitelisting until it becomes accessible to the average SMB / Education sector networks, maybe it can work now for financial and gov who could possibly through a team of 10 or 20 dedicated project staff at it while first implementing, but for everyone else, good luck!

    1. Kayla Thrailkill

      Our whitelisting approach is very different than that of our competitors. First, it is proactive which when compared to our competitors, theirs is reactive. We believe is preventing the problem from ever occurring, instead of putting all of our eggs into one basket when it comes to reacting when an infection occurs. Of course we have reactive detection as well, but we have out performed all of our competitors with our proactive detection due to our whitelisting technology. We have also been using whitelisting since 2011. Therefore, we have 5 years worth of “good files” that we allow to run. Whitelisting has become a new concept to several software companies, so they do not have the data bank we do. Understandably, good files are increasing and we need to keep up with them. If someone encounters an issue where they are trying to run a file and we block it because it is not on our whitelist, it will be tested and recategorized within 24 hours as either safe or malicious. Or, if the user so chooses, they can override the whitelist with seven mouse clicks. This is not encouraged, but if they know the file is safe with 0% chance of a virus or malware being attached, they have the opportunity to open it anyway.

      So to answer your question, Tech Sentry is different in three major ways. We use our whitelist as a proactive detection tool. Our list is far larger than that of any other competitor due to our years of experience with this format of protection. Lastly, any blocked files are tested within 24 hours to minimize any inconvenience.

      Great question!

Leave a Comment

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.