Is there a hole in your network security? Unless you’re using an application whitelisting service like ThreatLocker, the answer is “yes”.
OTM has witnessed ransomware events that have locked up “protected” networks. Despite implementation of standard security measures including a full featured firewall, email filtering, and endpoint protection, successful attacks used compromised user and administrator passwords. When passwords are compromised, conventional, “best practices” are circumvented. We can verify what you’ve heard in the news. Ransomware attacks are increasing and everyone is at risk.
We discovered Threatlocker via a recommendation by a cybersecurity auditing company. It provides four components that get you closer to a Zero Trust network architecture. First, ThreatLocker learns and provides details of what’s installed on your network and how these applications engage other applications. The distinguishing benefit of ThreatLocker is the Ringfencing tool. If an administrator level account is compromised, common system tools like PowerShell, Command prompt and Regedit that are normally accessible by the administrator, can’t be used against the system unless that action has been explicitly defined. For example, if PowerShell is permitted, it is only allowed in a specific instance, “MyCustomScript.ps” for example. Also included are features enabling control of storage and file share access, as well as privileged access management.
To learn more about how ThreatLocker works, check out this brief 22 minute demonstration provided by ThreatLocker’s founder, Danny Jenkins: https://www.youtube.com/watch?v=q9S332y-kQg. For further questions, contact us here at OTM by calling 800-292-3537, option 1.