Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.
Address
1950 Summit Park DriveMaitland
Orlando
Florida
32810
United States
Telephone
8332927732Contact Exhibitor
Products
-
What Is ThreatLocker® Community? ThreatLocker Community brings IT admins together to stay ahead of zero-day vulnerabilities and other potential threats. This feature provides a forum where admins can ...
-
What Is the ThreatLocker® Testing Environment? ThreatLocker Testing Environment uses a Virtual Desktop Infrastructure (VDI) to enable administrators to evaluate an approval request quickly. Without ta ...
-
Cyber Hero® MDR is an add-on to ThreatLocker Detect that allows organizations to opt for the ThreatLocker Cyber Hero (CH) Team to monitor and respond to Indicators of Compromise. When ThreatLocker Det ...
-
What Is ThreatLocker® Detect? ThreatLocker® Detect is a policy-based Endpoint Detection and Response (EDR) solution. This EDR addition to the ThreatLocker Endpoint Protection Platform watches for unus ...
-
What Is Storage Control? Storage Control provides policy-driven control over storage devices, whether the storage device is a local folder, a network share, or external storage such as a USB drive. Th ...
-
What Is Elevation Control? Elevation Control is a policy-based endpoint privilege management solution that assists organizations in being secure but still efficient in their operations. Instead of gra ...
-
Why Is Configuration Manager Important? Traditionally, companies require components of group policy from Active Directory (AD) to set Windows configurations, requiring users to be on the network or us ...
-
What Is Network Control (Network Access Control)? ThreatLocker® Network Control is a firewall for endpoints and servers that can be managed centrally. It provides complete control over network traffic ...
-
What Is Application Containment (Ringfencing™)? Ringfencing™ controls what applications can do once they are running. Think of Ringfencing as a barrier and extra security measure that is actively cont ...
-
Application Allowlisting, previously known as "Application Whitelisting," works by a simple rule: if it's not expressly permitted, it's not allowed. This robust form of access control prevents untrust ...
Videos
-
ThreatLocker® is a Zero Trust endpoint protection platform that provides enterprise-level cybersecurity to organizations globally. With ThreatLocker, you can allow only what you need and block