Show Price
We make it happen! Get your hands on the best solution based on your needs.
Firewall Policy Management
Allows centralized control and customization of firewall rules to manage and secure network traffic.
Time Based Policies
Set security rules and restrictions based on specific times or schedules.
Application Containment
Isolates applications to prevent them from affecting other parts of the system or network.
Granular Application Policies
Offers detailed control over which applications can perform specific actions or access certain resources.
Incident Response Integration
Provides tools and processes for effectively responding to and managing security incidents.
Zero Trust Model
Assumes no application or user is trusted by default and requires verification before granting access.
Audit and Visibility
Delivers comprehensive logs and insights into application activity and security events.
Data Access Management
Controls and monitors access to sensitive data, ensuring only authorized users can view or modify it.
Behavioral Analytics
Analyzes application behavior to detect unusual or potentially malicious activity.
Forensics and Analysis
Provides tools for investigating and understanding security incidents to improve future defenses.
Brand Name | ThreatLocker |
Information | ThreatLocker® is a global leader in Zero Trust endpoint security. |
Founded Year | 2017 |
Director/Founders | Danny Jenkins, John Carolan, Sami Jenkins |
Company Size | 101-500 Employees |
20,000+ Software Listed
Best Price Guaranteed
Free Expert Consultation
2M+ Happy Customers