ZERO TRUST ENDPOINT PROTECTION PLATFORM
ThreatLocker® entered the Gartner quadrant as a Strong Performer among the endpoint protection platforms:
ThreatLocker provides powerful tools
To effectively manage security, control access and prevent threats to your IT infrastructure:
Ringfencing
Restrict the interaction of applications to prevent them from being exploited and used for malicious purposes.
Allowlisting
Allow only the necessary software by blocking malware, viruses and other unwanted programs.
Network Control
Regulate network traffic by dynamically opening and closing ports for authorized connections.
Elevation Control
Allow updates and applications to run with administrator rights without granting users local admin rights.
Storage Control
Control access to USB, network storage, and local hard drives with a full audit.
ThreatLocker® Detect (Ops)
Detect anomalies in the environment using telemetry data to identify compromises and respond quickly to them.
Ringfencing™
Gives you full control to help manage your programs and better protect your endpoints.
Once started, applications have the same access as the logged-in user, Including interaction with powerful built-in tools and data. Attackers often use legal programs to carry out their attacks.
How does it work Ringfencing™:Ringfencing™ Creates barriers around applications, limiting their interaction with other applications, networks, and files. This prevents attackers from using legitimate programs to attack. Each program has clearly defined permissions that can be adapted to the specific needs of the organization.
Why is it critical:Protection with Ringfencing™ provides an additional layer of security, reducing the risk of exploiting application vulnerabilities. This allows you to reduce the likelihood of attacks, protect sensitive data and ensure the continuity of business processes.
Allowlisting
ThreatLocker ® has an advanced approach to whitelisting applications to allow only the software you need and block everything else.
How Allowlisting works:If the program is not included in the allowed list, it is blocked. After installing the agent, the system in training mode creates a list of all programs and their dependencies used. The administrator then reviews and adjusts the list, removing unnecessary programs. All unauthorized programs are automatically blocked. Unlike antivirus, the Allowlisting method allows you to control which software, scripts, executable files, and libraries can be run on endpoints and servers.
Why is it critical:The white list provides control over which programs can run in the system. This allows you to effectively block not only malicious programs, but also any unauthorized software, reducing the risks of cyberattacks and leakage of confidential data.
Network Control
Cloud firewall for endpoints and servers with dynamic ACLs to block endpoints and control unwanted network traffic.
How Network Control works:Network Control by ThreatLocker® is a cloud-driven firewall for endpoints and servers that provides dynamic access control lists to block unwanted network traffic. Using customizable policies, users can provide granular access based on IP addresses or even specific keywords. Unlike a VPN that requires a connection through a central point, ThreatLocker® is a simple connection between the server and the client.
Why this is critical:The corporate firewall is a thing of the past: users work not only from the office, but also remotely. This destroys the IT perimeter and makes our devices and data vulnerable to cyber threats. Therefore, control over network traffic becomes extremely important to protect devices and our data. You can achieve this by implementing the Network Control solution.
Elevation Control
Users with local administrator rights are often a weak link in network security, as they can run applications with full rights. This poses risks, as attackers can use this access to spread malware.
How Elevation Control works:Elevation Control is a PAM (Privileged Access Management) policy-based solution that helps organizations be safe but effective in their operations. Instead of giving users permissions, policies can be created to automatically grant higher privileges to applications. This allows applications to access the necessary resources without providing users with this necessary information.
Why this is critical:Elevation Control allows administrators to remove local administrator rights from users, while allowing individual applications to run with administrator privileges. This is achieved through:
- Full review of administrative rights.
- Possibility to approve or reject access to specific applications.
- Time retention of access to applications.
- Integration with Ringfencing to prevent interaction between applications.
Storage Control
Storage control gives you complete control over your devices and data storage, including USB devices and network shared resources.
How Storage Control works:Storage Control provides policies to control access to storages such as local folders, network resources, and external devices. The administrator can set up detailed policies by allowing or denying access to certain repositories or files. When a user tries to access a locked device, they can request permission, which the administrator can quickly approve or reject.
Why this is critical:You can control what data can be accessed, as well as identify the programs, users, and computers that have access. ThreatLocker® Storage Control allows you to create detailed policies that deny or allow access to network folders, local folders, and external storages for certain users or applications. It also provides encryption on external data storage devices.
ThreatLocker® Detect
Using compromise indicators, ThreatLocker® Detect can detect and warn IT professionals that their organization may be attacked based on customizable thresholds and notification methods.
How ThreatLocker Detect works:Uses telemetric data collected in all ThreatLocker® modules to detect and respond to potential environmental compromise or weakness indicators. For example, if a company is using a vulnerable version of Microsoft Exchange, ThreatLocker® will warn the administrator that it is using a known vulnerable version of MS Exchange. At the same time, if the hacking attempt occurs based on this vulnerability, Ops can use automatic fixes to respond and strengthen the environment. At the same time, ThreatLocker® Application Control will block the execution of malicious software.
Why this is critical:ThreatLocker® Detect allows organizations to respond quickly to threats with automated actions and detailed notifications. This reduces the risk of data corruption and loss by quickly detecting and responding to potential threats.
Trust your perimeter to ThreatLocker:
<6 Months
Payback of investment
2 000 000+
Protected Endpoints
40 000
Protected organizations