A method threat actors use to reinstall malware onto a device after it is cleaned and rebooted. The program leaves vulnerabilities within the device for malware to relaunch.
Try ThreatLocker free for 30 days and experience full Zero Trust protection in your own environment.
Schedule a demo customized to your environment and explore how ThreatLocker aligns with your security goals.
Just starting to explore our platform? Find out what ThreatLocker is, how it works, and how it’s different.