View

Sorting

Products found: 2

logo
Offer a reference bonus
0.00

ThreatLocker Application Control

Application Whitelisting has long been considered the gold standard in protecting businesses from viruses, ransomware, and other malicious software. Unlike antivirus, Application Whitelisting puts you in control over what software, scripts, executables, and libraries can run on your endpoints and servers. This "default deny" approach not only stops malicious software, but it also stops any other unpermitted applications from running. Controlling what software can run should be the first line of defense in protecting yourself from malicious software. Ringfencing then adds the second line of defense for applications that are permitted. First, by defining how applications can interact with each other, and then controlling what resources applications can access, such as network, files, and registry. Ringfencing is an invaluable tool in the fight against fileless malware and software exploits.
  • Full granular audit of every executable, script, or library executed on your endpoints
  • Default deny application whitelisting approach to deny anything not trusted by your business
  • Thirty seconds single click approval
  • Stop fileless malware and limit damage from application exploits
  • Define how applications can integrate with other applications
  • ThreatLocker automatically adds new hashes when application and system updates are released
Unified Audit See granular details of every single application, script, or library opened on your endpoints in real-time. Including desktop, servers, and even laptops if they are in or out of the office. Ringfence Applications Control application access to resources, including network, registry, and file. Backed up by a real-time audit of all what network resources your applications are accessing. Firewall Like Application Policies A powerful firewall like policy engine that allows you to permit, deny or restrict application access at a granular level. Time-based policies Permit access to applications for a specified amount of time. Automatically block the application after the policy has expired.
... Learn more
-
-
ROI-
-
0
0
logo
Offer a reference bonus
0.00

ThreatLocker Storage Control

Most data protection programs on the market are butcher knife solutions to a problem that requires a scalpel. Blocking USB drives and encrypting data-storage servers can help secure your organization’s private data, but these tools don’t take into account that this data still needs to be utilized and quickly. Waiting for approval or trying to find a device that’s allowed to access needed files can drain hours of productivity. ThreatLocker Storage Control is an advanced storage control solution that protects information. We give you the tools to control the flow and access of data. You can choose what data can be accessed, or copied, and the applications, users, and computers that can access said data. By using ThreatLocker®, you are in control of your file servers, USB drives, and your data.
  • A full audit of all file access on USB, Network and Local Hard Drives
  • Restrict or deny access to external storage, including USB drives, network shares, or other devices
  • Single-click approval for specified devices or users
  • Approve for a limited amount of time or permanently
  • Restrict access to specific file types, for example only permit access to jpeg files from a camera
  • Limit access to a device or file share based on the application
  • Enforce or audit the encryption status of USB hard drives and other external storage
Enforce Encryption Comply with HIPAA, Sarbanes Oxley, and other compliance requirements by enforcing encryption of portable storage devices and stop users from copying data to unencrypted external storage. Restrict Access to Specified Applications Prevent Ransomware, Viruses, and other malicious software from accessing your file servers, backup drives, and other storage devices by configuring application-level security policies that only permit specific applications to access your data. Configure Per Device Policies Advanced and per device policies allow you to create an exception or define policies tied to specified device serial numbers. Full and Granular Audit of File Access Audit all file access, including reads, writes, moves, and deletes. A complete log of every user, computer, and application that has access to your files. With extended plans, we can store tamper-proof audits for up to 7 years.
... Learn more
-
-
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.