
ThreatLocker provides enterprise-level security software designed to protect against cyber threats. Their solutions include endpoint protection, application allowlisting, and network control, ensuring comprehensive security for organizations. ThreatLocker focuses on blocking untrusted software and preventing exploits, offering a unified audit for streamlined cybersecurity management.
Vendor
ThreatLocker
Company Website
- Allowlisting
ThreatLocker Allowlisting ensures only approved software runs on your network, blocking unauthorized applications and malware. This robust security measure operates by default-denying any unlisted software, significantly reducing the risk of cyber threats and enhancing endpoint protection.
- Cloud Control
ThreatLocker Cloud Control protects Microsoft 365 tenants from phishing attacks and token thefts by analyzing connection patterns. It ensures only trusted IP addresses and networks can access accounts, effectively blocking unauthorized access and enhancing security.
- Configuration Manager
ThreatLocker Configuration Manager allows IT professionals to set standardized Windows configurations from a central console. It simplifies the management of security policies, such as automatic lock policies and disabling autoplay, across multiple endpoints, ensuring consistent and secure configurations regardless of network domain.
- Cyber Hero Managed Detection and Response (MDR)
ThreatLocker Cyber Hero MDR enhances ThreatLocker Detect with 24/7 managed services, monitoring and responding to Indicators of Compromise. The Cyber Hero Team ensures rapid response to threats, minimizing risks and maintaining security around the clock.
- Detect
ThreatLocker Detect is a policy-based Endpoint Detection and Response (EDR) solution that monitors for unusual events or Indicators of Compromise. It leverages telemetry data to identify and respond to potential cyber threats, ensuring swift and automated actions for enhanced security.
- Elevation Control
ThreatLocker Elevation Control is an endpoint privilege management tool that allows administrators to revoke local admin rights while granting specific applications elevated privileges. This ensures secure and efficient operations by controlling application access without giving users admin credentials.
- Insights
ThreatLocker Insights helps IT security professionals make informed decisions by analyzing data from millions of endpoints. It simplifies the process of determining application safety, network impact, and vulnerabilities, enabling faster and more confident decision-making.
- Network Control
ThreatLocker Network Control is an endpoint firewall solution that provides centralized management of network traffic. It uses dynamic ACLs to grant access based on IP addresses and other criteria, ensuring secure and flexible network access for both office and remote users.
- Ringfencing
ThreatLocker Ringfencing limits what applications can do, preventing them from interacting with other applications, files, data, or the internet. This containment strategy reduces the risk of exploits and unauthorized access, enhancing overall security by isolating applications.
- Storage Control
ThreatLocker Storage Control offers enterprise-level data protection by setting granular policies over storage devices. It ensures secure access to local folders, network shares, and external storage, preventing unauthorized access or theft.