ThreatLocker

Allow what you need, block everything else... including ransomware.

Stop known and unknown viruses, ransomware, and other malicious software; block unwanted software from running, regardless of administrative privilege; and achieve compliance with NIST, HIPAA, CIS, PCI, Essential Eight, and other regulations.

 

Enterprise-grade Security Software

Access Controls to
Combat Cyber Threats

Streamline the way your IT professionals handle their cybersecurity, while preventing ransomware

  • Control Network Traffic - A host-based firewall that dynamically allows access using automatic ACLs.
  • Ringfencing™ applications - Prevent exploits and attackers from weaponizing legitimate tools such as PowerShell by limiting what software can do.
  • Block untrusted software - With ThreatLocker Allowlisting, deny all applications and scripts from running except those that are explicitly allowed, including ransomware.
  • Simplify with a unified audit - The ThreatLocker Unified Audit is a centralized location displaying all audited data about what's occurring within the environment.
 

Why ThreatLocker

Zero Trust Endpoint Protection Platform

ThreatLocker offers a unified approach to protecting users, devices, and networks against the exploitation of zero-day vulnerabilities.

Allowlisting

Allowlisting has long been considered the gold standard in protecting businesses from known and unknown executables. Unlike antivirus, Allowlisting puts you in control over what software, scripts, executables, and libraries can run on your endpoints and servers.

Ringfencing

Ringfencing adds a second line of defense for applications that are permitted. First, by defining how applications can interact with each other, and secondly, by controlling what resources applications can access, such as networks, files, and registries.

Network Control

Network Control allows for total control of inbound traffic to your protected devices. Using custom-built policies, you can allow granular access based on IP address or even specific keywords. Unlike a VPN that needs to connect through a central point, ThreatLocker Network Control is a simple connection between server and client.

Elevation Control

ThreatLocker Elevation Control provides an additional layer of security by giving IT administrators the power to remove local admin privileges from their users, whilst allowing them to run individual applications as an administrator.

Storage Control

ThreatLocker Storage Control is an advanced storage control solution that protects information. You can choose what data can be accessed, or copied, and the applications, users, and computers that can access said data.

ThreatLocker Detect

ThreatLocker Detect looks for any anomalies that may make an environment vulnerable to a cyberattack. It analyzes data from ThreatLocker modules and notifies the admin if their system is using a version of software that's known to have cyber vulnerabilities.

 

Protection

Blocking Exploits of
Known and Unknown Vulnerabilities

See why businesses choose ThreatLocker to prevent the weaponization of trusted and untrusted software

Remote Access Attacks

Remote access to your systems for outside users and partners is vital for today’s businesses, but it’s also a fertile avenue of attack for cybercriminals. ThreatLocker sees to it that even authorized visitors to your servers and systems can’t deliberately or unintentionally let malware in.

  • Per user limits - Eliminate the need to grant blanket access as ThreatLocker creates policies for organizations or unique users.
  • Protect remote assets – ThreatLocker is fully compatible with remote desktops and Citrix servers so employees can work securely from anywhere.
  • Control of unknown apps – ThreatLocker unobtrusively controls the applications of trusted visitors to prevent cybercriminals piggybacking in.
 
 

Malware

Ransomware and other malicious software can copy or encrypt your files in a few minutes. ThreatLocker uses a more logical approach to stop viruses and malware from affecting your business. ThreatLocker Application Control uses a combination of default deny and Ringfencing to protect your business from known and unknown malware threats.

  • Zero-day Attacks - ThreatLocker protects against vulnerabilities that haven’t even been discovered yet.
  • Macro Viruses – Malware embedded in trusted programs like Office can’t overcome ThreatLocker Ringfencing.
  • Fileless Malware – Even malware that hides in memory can’t sneak in; if its code isn’t on the trusted list, it isn’t getting access.
  • Ransomware – Ringfencing lets you dictate how apps interact with data; if a program, ANY program, tries to encrypt data it isn’t authorized to, it will be blocked.

Data Theft

It is important to know what is happening on your data storage devices at all times. Without that visibility, you risk these devices being left wide open to a cyber attack. ThreatLocker not only lets you track and control external data access (e.g., via the internet) but internal access as well. When your security team has complete visibility over your data storage, they'll be able to block data theft before it happens.

  • Control physical copying - With the right ThreatLocker Storage Control policies in place, a bad actor on your premises with a USB drive won’t be able to copy a thing.
  • Monitor access – See who is accessing your files and when with detailed reports generated in real time by ThreatLocker.
  • Restrict Applications – Let only trusted apps access your data, as determined by your custom policies.
 
 

IT Disputes

With remote working on the rise, and the need for employees to be able to work anywhere, anytime, the need to track their computer activities is becoming increasingly important. ThreatLocker enables you to have visibility and control over the files and applications users are accessing on a day-to-day basis.

  • Track file access - Get detailed, real-time reports on who accessed data and what they did with it.
  • Track changes and deletions – Thorough records for any file type let you see the complete history of your data.
  • Block unauthorized apps – ThreatLocker custom policies let you block any apps you want, regardless of if they are malware or not.

Sign up for the Micron21 Newsletter