-
Application Allowlisting, previously known as "Application Whitelisting," works by a simple rule: if it's not expressly permitted, it's not allowed. This robust form of access control prevents untrust ...
-
Why Is Configuration Manager Important? Traditionally, companies require components of group policy from Active Directory (AD) to set Windows configurations, requiring users to be on the network or us ...
-
What Is ThreatLocker® Detect? ThreatLocker® Detect is a policy-based Endpoint Detection and Response (EDR) solution. This EDR addition to the ThreatLocker Endpoint Protection Platform watches for unus ...
-
What Is ThreatLocker® Community? ThreatLocker Community brings IT admins together to stay ahead of zero-day vulnerabilities and other potential threats. This feature provides a forum where admins can ...
-
What Is Application Containment (Ringfencing™)? Ringfencing™ controls what applications can do once they are running. Think of Ringfencing as a barrier and extra security measure that is actively cont ...
-
What Is Elevation Control? Elevation Control is a policy-based endpoint privilege management solution that assists organizations in being secure but still efficient in their operations. Instead of gra ...
-
Cyber Hero® MDR is an add-on to ThreatLocker Detect that allows organizations to opt for the ThreatLocker Cyber Hero (CH) Team to monitor and respond to Indicators of Compromise. When ThreatLocker Det ...