Skip to main content

Navigation Call to Actions

ThreatLocker

Stand: M50
  • | Founding Partner
  • | End point security
Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.

Address

1950 Summit Park Drive
Maitland
Orlando
Florida
32810
United States

Telephone

8332927732
Visit website

Contact Exhibitor


Products

Loading
  • What Is ThreatLocker® Community? ThreatLocker Community brings IT admins together to stay ahead of zero-day vulnerabilities and other potential threats. This feature provides a forum where admins can ...
  • Testing Environment

    16 Sep 2024
    What Is the ThreatLocker® Testing Environment? ThreatLocker Testing Environment uses a Virtual Desktop Infrastructure (VDI) to enable administrators to evaluate an approval request quickly. Without ta ...
  • Cyber Hero® MDR is an add-on to ThreatLocker Detect that allows organizations to opt for the ThreatLocker Cyber Hero (CH) Team to monitor and respond to Indicators of Compromise. When ThreatLocker Det ...
  • ThreatLocker® Detect

    16 Sep 2024
    What Is ThreatLocker® Detect? ThreatLocker® Detect is a policy-based Endpoint Detection and Response (EDR) solution. This EDR addition to the ThreatLocker Endpoint Protection Platform watches for unus ...
  • Storage Control

    16 Sep 2024
    What Is Storage Control? Storage Control provides policy-driven control over storage devices, whether the storage device is a local folder, a network share, or external storage such as a USB drive. Th ...
  • Elevation Control

    16 Sep 2024
    What Is Elevation Control? Elevation Control is a policy-based endpoint privilege management solution that assists organizations in being secure but still efficient in their operations. Instead of gra ...
  • Configuration Manager

    16 Sep 2024
    Why Is Configuration Manager Important? Traditionally, companies require components of group policy from Active Directory (AD) to set Windows configurations, requiring users to be on the network or us ...
  • Network Control

    16 Sep 2024
    What Is Network Control (Network Access Control)? ThreatLocker® Network Control is a firewall for endpoints and servers that can be managed centrally. It provides complete control over network traffic ...
  • Ringfencing™

    16 Sep 2024
    What Is Application Containment (Ringfencing™)? Ringfencing™ controls what applications can do once they are running. Think of Ringfencing as a barrier and extra security measure that is actively cont ...
  • Application Allowlisting, previously known as "Application Whitelisting," works by a simple rule: if it's not expressly permitted, it's not allowed. This robust form of access control prevents untrust ...

Videos

Loading
  • ThreatLocker® is a Zero Trust endpoint protection platform that provides enterprise-level cybersecurity to organizations globally. With ThreatLocker, you can allow only what you need and block   

News

Loading
Loading
View all Exhibitors