Request a Demo

Learn about a Whitelist Firewall and How it is Used

Wouldn’t it be nice to be able to tell just what was good and what was bad without having to wait until it was scanned and potentially harmful to your computer? At Comodo, we can help you have something because our product can effectively create a whitelist firewall, which includes:

  • Websites
  • Networks
  • People/devices
  • Software
  • Applications

Whitelists help you by including all the items above, and nothing else is allowed into the system. Most computers have a built-in firewall that is supposed to help keep out the threats and attacks, but it doesn’t always work the best. Therefore, you may find that you need to employ whitelisting to help.

Definition of Firewall

If you think about your computer like a city, the firewall would be the sheriff. It keeps all these rules and checks them each time you open something or have an incoming communication from the Internet. It usually comes with preset rules that can be changed by administrators and needs change.

It often uses whitelists to keep everything out except those things you want. If it doesn’t appear on the list, it is rejected and cannot be run or opened. It can be an effective tool against malware and other threats, but it may not be enough.

Our product acts like multiple products all in one. It includes a firewall, antivirus software, antimalware software and a whitelist so you can begin whitelisting everything you need and keeping out what you don’t want.

For example, if you find productivity to be lacking, employees may be spending their time playing the built-in computer games instead of working. If you use whitelisting, you just don’t add the games to the list and then employees can’t play them. Contact us today to learn more about whitelist options.