ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic. Ringfencing™ adds a second line of defense for applications that are permitted. First, by defining how applications can interact with each other, and secondly, by controlling what resources applications can access, such as networks, files, and registries.
Additional capabilities include:
Protects data from malicious behavior
Stops fileless malware and limit damage from application exploits
Defines how applications integrate with other applications
Stops applications from interacting with other applications, network resources, registry keys, files.
Stop sapplications from interacting with built-in tools such as PowerShell, Command Prompt and RunDLL
Stops built-in tools from accessing file shares
"Allowlisting" controls what software, scripts, executables, and libraries can run on endpoints and servers. This approach not only stops malicious software, but it also stops other unpermitted applications from running.