What Is ThreatLocker® Community? ThreatLocker Community brings IT admins together to stay ahead of zero-day vulnerabilities and other potential threats. This feature provides a forum where admins can
…
What Is the ThreatLocker® Testing Environment? ThreatLocker Testing Environment uses a Virtual Desktop Infrastructure (VDI) to enable administrators to evaluate an approval request quickly. Without ta
…
Cyber Hero® MDR is an add-on to ThreatLocker Detect that allows organizations to opt for the ThreatLocker Cyber Hero (CH) Team to monitor and respond to Indicators of Compromise. When ThreatLocker Det
…
What Is ThreatLocker® Detect? ThreatLocker® Detect is a policy-based Endpoint Detection and Response (EDR) solution. This EDR addition to the ThreatLocker Endpoint Protection Platform watches for unus
…
What Is Storage Control? Storage Control provides policy-driven control over storage devices, whether the storage device is a local folder, a network share, or external storage such as a USB drive. Th
…
What Is Elevation Control? Elevation Control is a policy-based endpoint privilege management solution that assists organizations in being secure but still efficient in their operations. Instead of gra
…
Why Is Configuration Manager Important? Traditionally, companies require components of group policy from Active Directory (AD) to set Windows configurations, requiring users to be on the network or us
…
What Is Network Control (Network Access Control)? ThreatLocker® Network Control is a firewall for endpoints and servers that can be managed centrally. It provides complete control over network traffic
…
What Is Application Containment (Ringfencing™)? Ringfencing™ controls what applications can do once they are running. Think of Ringfencing as a barrier and extra security measure that is actively cont
…
Application Allowlisting, previously known as "Application Whitelisting," works by a simple rule: if it's not expressly permitted, it's not allowed. This robust form of access control prevents untrust
…