Register for Zero Trust World 25!
Back to Blogs Back to Press Releases
Blog header image of what is ThreatLocker Testing Environment
December 8, 2022
Product

What is ThreatLocker’s Testing Environment?

Table of Contents

Introduction

Running any new application can be a daunting task at first. The onboarding process is often tedious, time-consuming, and can take away from normal workflow. Allowlisting, for example, is not a set-and-forget solution for today’s dynamic organizations. When users request to run new applications after endpoints have been secured, admins still need to decide whether to allow or deny such requests. This often requires very specific knowledge about said requested application. For due diligence, tedious and time-consuming research is often conducted in order to verify whether an application meets an organization's safety requirements. But that all changes with the Testing Environment.

What Is the Testing Environment?

ThreatLocker’s Testing Environment utilizes a Virtual Desktop Infrastructure (VDI) that enables admins to evaluate approval requests in a timely manner without significantly impacting workflow. With a one-button click within a request to add a new application, a temporary testing environment is created in which it runs the requested application without taking the risk of running an unknown application in a production environment. The VDI creates a cloud-based environment that allows businesses to examine applications safely and determine how best to proceed in real-time.  

Why Is the Testing Environment Important?

Having a VDI makes application testing more efficient in many ways. Real-time audits allow for red alerts to be set up for certain parameters which give the admin additional info. All data is logged in real-time, ensuring you have the critical information you need to ascertain the potential risk before installing new software. ThreatLocker’s Risk Center performs many different evaluations including: checking to see if any AV vendors have flagged an application as having malicious content, checking to see if an app uses canary files to access data storage locations, checking to see if an application has made changes at the system level, checking to see if an application has made changes to the registry, and much more. The tabs in the audit provide full details of the impact of each alert in a single click. This enables admins with the information needed to quickly and confidently act upon an application install request.  

Conclusion

We should always strive to stay vigilant when running certain applications regardless of how many safeguards are in place. However, the Testing Environment allows admins to safely evaluate new applications without the risk of running in a production environment. The VDI is a powerful tool that allows for rapid informed installation decision-making, which helps you work at your own pace without inhibiting workflow.  

If the Testing Environment sounds like something you need to help with new application allowlisting decisions, then consider adding ThreatLocker to your security stack. ThreatLocker has been helping companies with securing their endpoints for years and can help implement a personalized plan for you. For more on zero trust cybersecurity, book a demo to see how ThreatLocker endpoint security could be the perfect fit for your business.

Author:
Contributor: