Cyber Security

Technical Overview

PC Matic Pro uses a cloud-based, global whitelist to protect Windows endpoints. Unknown applications are always blocked, which allows us to block even the newest forms of malware. In contrast to traditional application control, PC Matic Pro won’t require extra IT staff for implementation. Our whitelist is updated with more known good software everyday, providing application whitelisting with no heavy lifting for IT departments.

SuperShield, a component of PC Matic, hooks each running process and will check the static information of the application before it is allowed to run. This check is performed quickly and uses little system resources because there is no behavioral analysis involved. PC Matic will return a result of either known good (allowed to run), known bad (will not execute), or unknown (blocked & uploaded for analysis by our research team).

Our global whitelist has been curated for years by our malware team allowing easy implementation of application whitelisting with a simple client install. After installing, the web portal allows for access to vulnerability management, driver management, and maintenance, all requiring only the initial endpoint client installation. Additionally, Remote Desktop Protocol is available from the same web portal, allowing 1-click access to endpoints.

Whitelisting is backed by 3rd parties


"Whitelisting uses a "positive security" model, which defines what is "good and allowed" and rejects everything else. In contrast, a blacklist-based security model defines what should be rejected and implicitly allows everything else. A positive security model is powerful because it: Defaults to deny and Is attack-agnostic"

- Chris Sherman and Chenxi Wang, Ph.D; Forrester Analysts


Analysts Peter Firstbrook and Neil MacDonald believe Whitelisting solutions: "...can provide excellent proactive protection by enforcing a "default-deny" application execution environment, allowing only known applications to execute"

Moreover, none of the signature-based malware engines are ever 100% effective at detecting known threats, and accuracy at detecting new threats is only 30%. Low distribution/targeted threats are even more elusive to signature techniques.