ThreatLocker® Zero Trust Endpoint Protection Platform
Photo Gallery
ThreatLocker® Zero Trust Endpoint Protection Platform
Additional Info
Company | ThreatLocker, Inc. |
Website | https://www.threatlocker.com/ |
Company size (employees) | 100 to 499 |
Headquarters Region | North America |
Overview
ThreatLocker® is a global leader in Zero Trust endpoint security. The ThreatLocker® Zero Trust Endpoint Protection Platform combines Application Allowlisting, Ringfencing™, Network Control, Storage Control, Elevation Control, and Endpoint Detection and Response solutions in ways that make security simple for the IT professional. ThreatLocker® utilizes a deny by default approach that blocks all software, including ransomware, from running unless it is explicitly allowed. Since its founding in 2017, ThreatLocker® has been recognized as one of the best cybersecurity protection platforms that now includes EDR, MDR and compliance-friendly controls and monitoring.
Key Capabilities / Features
1. Ringfencing™
- Ringfencing™ empowers customers with comprehensive control over their applications and endpoints, ensuring robust management capabilities.
2. Allowlisting
- Allowlisting enables customers to meticulously manage what software, scripts, executables, and libraries are permitted to run on their endpoints and servers. It also provides the ability to block unauthorized applications, including ransomware, enhancing overall security posture.
3. Storage Control
- Storage Control offers customers complete autonomy over their storage devices, including USBs and network shares. This level of control helps prevent unauthorized access and data breaches.
4. Elevation Control
- With Elevation Control, IT administrators can bolster security by revoking local admin privileges from users, while still permitting them to run specific applications as an administrator. This added layer of security minimizes the risk of unauthorized system changes.
5. Network Control
- Network Control empowers users to configure network access to endpoints using both global and granular policies. This feature provides customers with a centralized view of endpoint policies across their organization, allowing them to deny all traffic to published servers while permitting access to specific IP addresses or keywords, enhancing network security.
6. ThreatLocker® Detect
- ThreatLocker® Detect alerts IT professionals about attempted attacks, enabling timely responses based on predefined policies. These responses can include enabling, disabling, or creating Application Control, Storage Control, or Network Policies. Policies can be tailored to alert and respond differently based on the severity of the threat, enhancing threat mitigation strategies.
How we are different
- ThreatLocker® takes a different approach to cybersecurity than what has been traditionally utilized by the cybersecurity industry. ThreatLocker® operates by a strict deny-by-default process in which nothing is permitted to run, ensuring that only trusted applications and processes are allowed to execute. This method provides a higher level of security by minimizing the attack surface and preventing unauthorized programs from compromising the system. ThreatLocker®'s approach enhances cybersecurity defenses, offering a proactive solution that effectively protects against emerging threats and cyberattacks.
- The ThreatLocker® platform collects millions of event logs of data daily, all visible in the customer’s Unified Audit. The Unified Audit has become a proven asset in both aligning with cybersecurity compliance frameworks requiring the constant monitoring of systems, as well as acting as a cyber forensics tool that can be deployed, along with the rest of the ThreatLocker® platform, into an environment undergoing an active cyberattack.
- ThreatLocker’s Cyber Hero Support Team provides best-in-class 24/7/365 support services to customers. With an average customer response time of 60 seconds or less, the Cyber Hero Support Team delivers technical support, consulting services, project management, and more, providing customers with vast cybersecurity knowledge to help support, guide, and encourage customers to enhance their cybersecurity infrastructures.