YOUR ANTIVIRUS IS A FILTER.
CYBERLOCK IS A COMPUTER LOCK.
DOWNLOAD NOW

NEWS & UPDATES

VOODOOSHIELD IS NOW CYBERLOCK.GLOBAL!

Read about VoodooShield CyberLock at Microsoft.com!

VoodoShield uses ML.NET to detect malware - September 2022

"Well, the technology in VoodooSoft's VoodooShield 2.0 is so simple and effective,
it might as well be some kind of magic."

Neil J. Rubenking, PC Magazine - October 2014

"VoodooShield is not based on signatures or behavioral analysis, so it can be installed
next to another anti-virus. VoodooShield can completely replace traditional anti-virus software,
far outweighing the effectiveness of protection available in this ranking of security solutions.”

Adrian Ścibor, AVLab - March 2019




the concept

CYBERLOCK IS FAR BEYOND TRADITIONAL APPLICATION WHITELISTING

DYNAMIC SECURITY POSTURES

The Achilles’ heel of all cybersecurity products is that they are only able to offer a single static level of protection, so at any given time their security posture is likely either too aggressive or too relaxed, resulting in false positives and breaches. CyberLock solves this issue by dynamically adjusting its security posture on the fly, based on the end-user’s current activity and behavior. As a result, we are able to offer a tighter and more robust lock than is possible with any other product.

ANTIMALWARE CONTEXTUAL ENGINE

In cybersecurity, context is everything.
Our unique Antimalware Contextual Engine is a highly developed, refined and sophisticated algorithm that examines the context of every feature of every possible attack chain event, so that benign events are automatically allowed and potentially malicious events are automatically blocked. This enables CyberLock to provide extremely robust ransomware, script, LOLBins and fileless malware protection capabilities.

WHITELISTCLOUD

WhitelistCloud is a patent-pending advanced file reputation service that continuously monitors all running processes and ensures only safe items are running at any given time. WhitelistCloud is essentially the exact opposite of traditional and next-gen antivirus detection mechanisms. Traditional and next-gen antivirus scans for malicious files, while WhitelistCloud scans for safe files so that Administrators and users are continually aware that only safe files are running on their networks.

CyberLock is the only deny-by-default / zero trust solution that has ever been

recognized in the PCMag "Best Antivirus Protection" top 10 list

HOW CYBERLOCK IS DIFFERENT

DYNAMIC SECURITY POSTURES + ANTIMALWARE CONTEXTUAL ENGINE + WHITELISTCLOUD FILE REPUTATION SCAN

  1. CyberLock is the only patented tangible toggling computer lock in the industry, and it is designed to complement your traditional or next-gen antivirus (including Microsoft Defender). There are other deny-by-default / zero trust products, but only CyberLock functions as an actual computer lock with dynamic levels of protection (dynamic security postures). If it does not toggle, it is not a lock.
  2. The Achilles’ heel of all cybersecurity products is that they are only able to offer a single static level of protection, so at any given time their security posture is likely either too aggressive or too relaxed, resulting in false positives and breaches. CyberLock solves this issue by dynamically adjusting its security posture on the fly, based on the end-user’s current activity and behavior. Because of our dynamic security postures feature, CyberLock is able to offer a tighter and more robust lock than is possible with any other product.
  3. Cybersecurity experts agree that application whitelisting is by far the most effective security mechanism on the market, but no one ever bothered to make this technology user-friendly enough for the masses, until we created CyberLock. Before CyberLock, all application whitelisting products were active full-time, often when it did not make sense to be active, which most users and Administrators found to be annoying and untenable, so they would choose to forgo application whitelisting altogether. Our patented snapshot technology automatically builds the tiny, customized whitelist for the end-user, resulting in the smallest possible whitelist and attack surface in the industry.
  4. CyberLock does not force the end-user to respond to dangerous affirmative user prompts, which eliminates the possibility the end-user inadvertently allows an unknown item. Instead, CyberLock displays a mini prompt prior to asking the end-user to make a decision on whether to allow a new item or not.
  5. Through our WhitelistCloud technology, CyberLock scans its tiny, customized whitelist specifically for safe / clean files and automatically creates firewall rules for unknown items. In other words, traditional and next-gen antivirus scans for malware while WhitelistCloud scans for safe / clean files. As a result, Administrators are continually aware that only safe items are running on the endpoints. With traditional and next-gen antivirus, Administrators are somewhat certain that malware is not executing on the endpoints, but with WhitelistCloud, they are essentially certain that only safe items are executing at any moment in time.
  6. Our unique Antimalware Contextual Engine considers the entire attack chain in the parent / child process creation relationship. Not only does this make CyberLock more secure, our mechanism is flexible so that blacklisting vulnerable items globally is not required. For example, CyberLock is not required to blacklist PowerShell globally in order to protect against PowerShell attacks. In other words, CyberLock considers the entire attack chain so that benign scripts that need to execute are able to do so, while blocking malicious PowerShell attacks.
  7. CyberLock includes extremely robust ransomware, script, LOLBins and fileless malware protection capabilities, and is capable of blocking 139 potentially malicious file types.
  8. LOLBins (Living Off the Land Binaries) have become an increasingly common attack vector in the cybersecurity landscape. Other endpoint protection products typically only protect 5-50 vulnerable process (for example, powershell, cmd, cscript, regsvr32, forfiles, scheduled tasks, bcedit), while CyberLock protects 1,000’s of vulnerable processes system wide, all automatically, all with zero configuration. If a new vulnerable process is discovered, CyberLock automatically updates each endpoint in 4 hours or less.
  9. CyberLock created the anti-exploit mechanism that many vendors utilize today, but chose not to patent it. CyberLock is also the only deny-by-default product that protects the entire Windows system, as opposed to only protecting the Windows components that are currently being exploited by malware authors. With CyberLock, there is no need to update our mechanism when malware authors discover a new Windows component to exploit, which tends to happen every 3-4 months.
  10. CyberLock utilizes ML/Ai (VoodooAi) and reputation based file insight (WhitelistCloud) that provides the end-user with file insight so they are able to make an informed decision, while offering an end-user recommendation based on the provided file insight.
  11. Unlike products that utilize legacy / deprecated Software Restriction Policy (SRP) that operates in user-mode, CyberLock utilizes a modern kernel-mode monolithic blocking mechanism that does not require patches, hacks or tweaks to protect against new or undiscovered vulnerabilities and threats. In addition, unlike other products in its class, CyberLock is refined to the point that it does not require vendor co-management of the Web Management Console.
  12. CyberLock is highly customizable through its settings, allowing Administrators to fine tune the overall security posture for each end-user.
  13. CyberLock trains itself automatically and adapts to each endpoint very quickly. Users might notice a few unwanted blocks the first day or two as it automatically customizes itself to their system, but will soon experience just how silent zero trust can be. Some users prefer to put CyberLock on AutoPilot with the Relaxed Security Posture for a couple of days while it is customizing itself to their system, then switch to Smart or Always ON mode and the Aggressive Security Posture.

YOUR ANTIVIRUS IS A FILTER. CYBERLOCK IS A COMPUTER LOCK.

HOW CYBERLOCK WORKS

CYBERLOCK WILL TOGGLE BETWEEN ON AND OFF, DEPENDING ON WHETHER YOU ARE AT RISK OR NOT

OFF Mode (Unlocked): Your computer is unlocked, and CyberLock is learning which programs to allow so it will not block them once CyberLock locks your computer. You can also change to this mode if you need to install or allow additional software. Your computer is partially protected in this mode.

ON Mode (Locked): Your computer is locked and you are protected. When CyberLock automatically toggles to ON Mode, it takes a snapshot of the currently running software, and automatically allows everything in this snapshot. CyberLock also automatically allows currently installed software and specific critical Windows system files. Any software that was not allowed when CyberLock was OFF is blocked.

There is only one thing to keep in mind when using CyberLock...
If CyberLock blocks something that you would like to run, then allow it after it is automatically scanned.
Otherwise, if CyberLock blocks something out of the blue, then just ignore it and assume it was a virus or malware.

How To Allow (Whitelist) A Program

CyberLock will automatically allow known safe applications that are launched while CyberLock is in OFF Mode.

If CyberLock blocks software that you would like to run, simply click on the desktop shield gadget or balloon notification to scan and run the software. You can also left click on the desktop shield gadget to toggle to OFF Mode to allow additional software. You can also right click on CyberLock for more options and settings.

HOW TO PREVENT USERS FROM ALLOWING / WHITELISTING NEW ITEMS

Most users are able to use CyberLock properly. But for users who are click-happy, there are two different options to prevent them from allowing / whitelisting new items.

1) In CyberLock Settings / Basic tab, disable the “Enable balloon notification and user prompts” option.
2) If you want user requests to be sent to the Web Management Console, in CyberLock Settings / Web Management tab, enable the “Require admin approval before letting the user allow new, non-whitelisted files” option.


Cloud based scanning with WhitelistCloud and ML/Ai engines

CyberLock automatically analyzes blocked files with WhitelistCloud and VoodooAi ML/Ai scan engines!

If CyberLock blocks a file, it will automatically analyze the file with our patent pending WhitelistCloud file reputation scanner and VoodooAi ML/Ai engines.

DOWNLOAD CYBERLOCK

TRY CYBERLOCK FREE FOR 15 DAYS.
NO CREDIT CARD REQUIRED.

DOWNLOAD CYBERLOCK 7.77

Compatible with Windows 7, 8, 10 & 11 (64 bit only)

and Windows Server 2008 R2 through 2022 (64 bit only)



Bulgarian, Chinese, Czech, Danish, Dutch, English, Estonian, Finnish, French, German, Greek, Hungarian, Italian, Japanese, Latvian

Lithuanian, Polish, Portuguese, Portuguese (Brazilian), Romanian, Russian, Slovak, Slovenian, Spanish, Swedish, Turkish, Ukrainian



If you would like to trial CyberLock for SMB or Enterprise,
please email [email protected] for a CyberLock Enterprise trial account.



Download CyberLock User Guide

PURCHASE CYBERLOCK

WITH A CREDIT CARD OR PAYPAL

Please specify the number of devices below:

Multi-year registration options:

Volume pricing options for 1-3 year license:

1 device - $30 each
2-49 devices - $20 each
50+ devices - $10 each

Please enter the email address and password for your CyberLock account.


 

You can pay with PayPal or with a plain credit card through PayPal.

FAQ

NOTHING ELSE IS LIKE CYBERLOCK, SO THERE ARE ALWAYS QUESTIONS

What are the System Requirements for CyberLock?
For PC's, CyberLock is compatible with Windows 7 through 11 (64 bit only).
For Servers, CyberLock is compatible with Windows 2008 R2 Server through Windows Server 2022 (64 bit only).

As an administrator, am I able to lock down specific endpoints so the user is not able to allow / whitelist new items?
Most users are able to use CyberLock properly. But for users who are click-happy, there are two different options to prevent them from allowing / whitelisting new items.
1) In CyberLock Settings / Basic tab, disable the “Enable balloon notification and user prompts” option.
2) If you want user requests to be sent to the Web Management Console, in CyberLock Settings / Web Management tab, enable the “Require admin approval before letting the user allow new, non-whitelisted files” option.

CyberLock blocked something even though the shield indicated OFF, why is this?
The ON and OFF shield icons indicate the status of CyberLock’s locking mechanism. CyberLock has other protection mechanisms in addition to the lock, so even when CyberLock’s locking mechanism is OFF, one of the other protection mechanisms might block something suspicious.

Will CyberLock remove malware, especially pre-existing malware?
WhitelistCloud is especially adept in detecting malware and pre-existing malware, but CyberLock’s main focus is endpoint protection, not malware removal. If WhitelistCloud detects malware or pre-existing malware, the endpoint should be scanned with a specialized malware removal tool.

Antivirus software always slows down my computer, will CyberLock?
No. CyberLock is extremely fast and lightweight.

Does CyberLock work with traditional and next-gen antivirus software?
Yes, CyberLock works great with all common traditional and next-gen antivirus software, including Microsoft Defender. CyberLock was specifically designed to complement your traditional or next-gen antivirus.

I went to a questionable or unknown website and CyberLock keeps blocking something. What should I do?
Most likely CyberLock is preventing your computer from becoming infected with malware. We highly recommend that you do not visit that site.

Are Cyberlock licenses transferable?
Yes, your license is 100% transferable at any time to any machine. All you need to do is to log in to www.CyberLock.Global by clicking on the Account link, then go to the Devices tab and Delete your old device. You will then be able to register your new device, and it will then show up on the Devices tab, which can later be deleted if you need to transfer your license again.

FAVORITE QUOTES

HERE ARE SOME OF OUR FAVORITE QUOTES FROM AROUND THE WEB

"With apologies to Sir Arthur C. Clarke, any sufficiently advanced technology is indistinguishable from…voodoo? Well, the technology in VoodooSoft's VoodooShield 2.0 ($19.99 per year) is so simple and effective, it might as well be some kind of magic."
Neil J. Rubenking - PCMAG, October, 2014

"It's really a pretty simple idea but not one that we have seen combined into one program before. I would call this "simple brilliance" even though that's an oxymoron, it applies here. It was super easy to use, small in size and walks you through the first use. VoodooShield is something I believe can be used at any skill level. If you have had problems in the past, or didn't like using sandbox programs like VMWare or Sandboxie, then this might just be your solution."
MajorGeeks.com review

"I love this. Nothing has gotten past it yet. It is so simple to use. I even got my wife to use it on her laptop and she got the hang of it. Keep up the great work."
buckslayr - wilderssecurity.com


"LOVE I MEAN LOVE this application. Its exactly what I have been looking for! Now my only hope is that when its released its fairly priced."
noons - wilderssecurity.com

"No, thank you! What you guys have created is a masterpiece! It also works flawlessly with Sandboxie! I will do a large test against malware, with your permission, and perhaps post it here?"
shadek - wilderssecurity.com

"If you love VoodooShield just add Zemana Free and scan once a week and you are good."
NullByte - malwaretips.com


REVIEW AND TEST VIDEOS

CYBERLOCK REVIEW AND TEST VIDEOS!




SUPPORT

PLEASE LET US KNOW IF YOU HAVE ANY QUESTIONS OR COMMENTS.

CyberLock Account Features

Please login to your CyberLock account to:

  • Edit your whitelist
  • Copy whitelist from one computer to other computers
  • Add and remove computers