Register today for Zero Trust World 2026!

Complete Works stays on the offensive side with ThreatLocker®

More case studies

Company Description

Complete Works, Inc was established in 2018 as a break-fix and project-based company. In 2021, Complete Works transitioned into the MSP market to provide more focused services for its customers. Since its inception in 2018, Complete Works has doubled its revenue each year. Its clientele includes SMBs in the healthcare, legal, financial, and insurance industries. Complete Works offers email protection, endpoint security, encryption, data backup, network security, and security awareness training.

Challenges

  • The threat landscape is expanding, with internal and external threats that must be addressed.

  • Complete Works, Inc wanted a way to manage by exception instead of rule.

Benefits

  • ThreatLocker® Allowlisting blocks by default, helping maintain a Zero Trust security architecture.

  • Ringfencing™ creates parameters to limit what permitted applications can access to protect against the weaponization of trusted applications.

  • ThreatLocker® helps Complete Works, Inc to monitor their environment and stay proactive against threats.

First Impression of ThreatLocker

After hearing Danny Jenkins, ThreatLocker® CEO, speak at a virtual MSP conference in 2021, Johnny Largin,Complete Works, Inc President, says he “knew it made perfect sense to include ThreatLocker® in [their] cybersecurity stack.” He was extremely interested in Ringfencing™. Largin explained that although he had never heard of Ringfencing™ before, the concept “made perfect sense.” The ability to apply parameters to permitted applications, preventing their misuse, helps to fill a gap in their endpoint protection strategy.

 

Storage Control

Complete Works, Inc recognized that there was a need to be proactive in their security approach. Using ThreatLocker® Storage Control, Largin states, “We work to be on the offensive side instead of the defensive side.” Blocking all unknown or untrusted USB storage devices helps Complete Works protect their customers’ data from being copied onto those drives and prevents unknown applications from running from USB devices.

 

Zero Trust

“ThreatLocker® helps us stay proactive in our efforts to monitor and protect our environments,” explained Larkin. Blocking all unknown software, scripts, and libraries by default helps Complete Works have control over the applications in the environments theymanage. Each and every process and user must be verified before it is allowed to act. According to Largin, ThreatLocker® helps to support their Zero Trust model. Because bad actors can be inside and outside the business, Zero Trust is necessary to protect against them. Complete Works uses ThreatLocker® to help them to maintain Zero Trust, blocking by default and permitting by exception.  

 

Unsurpassed Support

The Cyber Hero Support Team is one of Complete Works’ favorite aspects of ThreatLocker®. “ThreatLocker®’s supportmodel is top-notch in word and action,” says Largin. Anytime they need to reach out to support, they are quickly greeted by a knowledgeable Cyber Hero Support Technician. According to Largin, ThreatLocker® University is filled with useful information, and they often leverage the university to answer questions for themselves. The publicly available resources combined with the 24/7/365 live support have made implementing and managing ThreatLocker® easier for Complete Works, which, in turn, enables them to “...stay diligent and proactive instead of reactive,” says Largin, which is needed to stay ahead of today’s threats.

Download case study

Get case study

Request your 30-day trial to the entire ThreatLocker platform today.

Try ThreatLocker