Use Cases and Deployment Scope
ThreatLocker is used on every endpoint and server in our business. The software's functionality allows us to apply a zero-trust principle to all areas of our internal systems. We use the software to block any applications outside of the scope of our pre-approved applications. Further, we use network control to block client-to-client or client-to-server connections on unnecessary protocols. We also use the config manager to apply policies into our environment that we would have traditionally had to build manually in group policy, allowing us to roll out policies company-wide or to specific groups. Anything that tries to breach these policies immediately alerts us, and as such, we can understand what is going on behind the scenes on our network and what users are trying to run versus what they are allowed to run. The picture this paints is invaluable for our confidence in a smooth operation.
Other Software Used
Cybereason Managed Detection & Response (MDR)