ThreatLocker Elevation Control connects to its cloud-based Application Control Suite to add an extra layer of security by creating access policies for individuals on specific applications.

The addition of PAM combined with ThreatLocker’s Application Whitelisting and Ringfencing™ solutions enables you to control what applications can run, who can access them, and how they interact in an organization’s environment.

Key Capabilities of ThreatLocker Elevation Control Include:

Complete Visibility of Administrative Rights:

Gives you the ability to approve or deny an individual’s access to specific applications within an organization even if the user is not a local administrator.

Streamlined Permission Requests:

Users can request permission to elevate applications and attach files and notes to support their requests.

Varied Levels of Elevation: 

Enables you to set durations for how long users are allowed access to specific applications by granting either temporary or permanent access.

Secure Application Integration

In combination with ThreatLocker Ringfencing™, ensures that once applications are elevated, users cannot jump to infiltrate connected applications within the network.