Aún no lo reviso, pero el programa en si lo conozco desde hace meses, he incluso lo he tenido instalado para hacer algunas pruebas, pero las pruebas no incluyeron bypassearlo

Por otra parte en este momento he estado googleando, y si bien lo siguiente hay que tomarlo con "pinzas" (es un caso de estudio parte de su publicidad), tampoco hay que descartarlo

:http://www.antiexecutable.com.au/download/CaseStudy_Granite.pdf
“As a test I asked my class of extremely tech-savvy students to have a go at trying to hack or cripple Faronics Anti-Executable,” says Scott. “After a week of unsuccessful attempts, the students have voted Faronics Anti-Executable to be bulletproof.”
Some of the ways in which the students tried to bypass Faronics Anti-Executable’s protection include:
• Replacing the a dministrator account
• Renaming unauthorized program names to authorized program names
• Program execution via batch files
• Replacing the white list file
• Hacking the computer management information
Saludos