Vendor
ThreatLocker
Company Website
- New arrivalCloud Control
ThreatLocker Cloud Control protects Microsoft 365 tenants from phishing attacks and token thefts by analyzing connection patterns. It ensures only trusted IP addresses and networks can access accounts, effectively blocking unauthorized access and enhancing security.
- New arrivalAllowlisting
ThreatLocker Allowlisting ensures only approved software runs on your network, blocking unauthorized applications and malware. This robust security measure operates by default-denying any unlisted software, significantly reducing the risk of cyber threats and enhancing endpoint protection.
- New arrivalRingfencing
ThreatLocker Ringfencing limits what applications can do, preventing them from interacting with other applications, files, data, or the internet. This containment strategy reduces the risk of exploits and unauthorized access, enhancing overall security by isolating applications.
- New arrivalNetwork Control
ThreatLocker Network Control is an endpoint firewall solution that provides centralized management of network traffic. It uses dynamic ACLs to grant access based on IP addresses and other criteria, ensuring secure and flexible network access for both office and remote users.
- New arrivalElevation Control
ThreatLocker Elevation Control is an endpoint privilege management tool that allows administrators to revoke local admin rights while granting specific applications elevated privileges. This ensures secure and efficient operations by controlling application access without giving users admin credentials.
- New arrivalCyber Hero Managed Detection and Response (MDR)
ThreatLocker Cyber Hero MDR enhances ThreatLocker Detect with 24/7 managed services, monitoring and responding to Indicators of Compromise. The Cyber Hero Team ensures rapid response to threats, minimizing risks and maintaining security around the clock.
- New arrivalConfiguration Manager
ThreatLocker Configuration Manager allows IT professionals to set standardized Windows configurations from a central console. It simplifies the management of security policies, such as automatic lock policies and disabling autoplay, across multiple endpoints, ensuring consistent and secure configurations regardless of network domain.
- New arrivalStorage Control
ThreatLocker Storage Control offers enterprise-level data protection by setting granular policies over storage devices. It ensures secure access to local folders, network shares, and external storage, preventing unauthorized access or theft.
- New arrivalInsights
ThreatLocker Insights helps IT security professionals make informed decisions by analyzing data from millions of endpoints. It simplifies the process of determining application safety, network impact, and vulnerabilities, enabling faster and more confident decision-making.
- New arrivalDetect
ThreatLocker Detect is a policy-based Endpoint Detection and Response (EDR) solution that monitors for unusual events or Indicators of Compromise. It leverages telemetry data to identify and respond to potential cyber threats, ensuring swift and automated actions for enhanced security.