Allow the software you need, and block everything else... Including ransomware.
Book DemoApplication Allowlisting denies all applications from running except those that are explicitly allowed. This means untrusted software, including ransomware and other malware, will be denied by default.
When the agent is first installed, it operates in Learning Mode. During this period all applications and their dependencies that are found or running on the computer are cataloged and policies are created to permit them. After the learning period, the IT administrator can review the list of applications, remove those that are not required, and secure the computer. Once the computer is secured, any application, script, or library that tries to execute that is not trusted will be denied. The user can request new software from the IT administrator, and it can be approved in 60 seconds.
See Learning ModeApplication Allowlisting has long been considered the gold standard in protecting businesses from known and unknown malware. Unlike antivirus or traditional EDR, Application Allowlisting puts you in control of what software, scripts, executables, and libraries can run on your endpoints and servers. This approach stops not only malicious software but also stops other unpermitted applications from running. This process greatly minimizes cyber threats and other rogue applications running on your network.
In addition to Allowlisting, ThreatLocker Testing Environment is a powerful tool that allows for risk-assessed approvals that eliminate the guesswork. The Testing Environment enables administrators to quickly verify an application, providing the critical and timely information needed to make the best decision for their organization.
See Testing EnvironmentDeny any application from running on your device that is not a part of the allowlist.
A powerful firewall-like policy engine that allows you to permit, deny or restrict application access at a granular level.
Permit access to applications for a specified amount of time. Automatically block the application after the policy has expired.
ThreatLocker® automatically adds new hashes when application and system updates are released, allowing your applications to update without interference while preventing updates from being blocked.
The goal of Zero Trust is only to allow what is needed and to block everything else. To stop business interruption, ThreatLocker will automatically learn what is required in your environment and build policies that include applications and their dependencies in a Learning Mode. The first step is to deploy the agent, which can be deployed using various automation tools.
The agent will not block anything during the initial deployment; instead, it will go into Learning Mode. After a week of learning, you can review the list of policies that have been created, deny or limit any software you do not want, and secure your environment.
Before you secure your environment, you have the option to simulate potential denies based on a period of time. This will ensure no strange applications will cause issues.
ThreatLocker will walk you through this process, by scheduling weekly calls to deploy, review policies, and help you secure your environment.
A typical deployment in a medium to large business should take about 5 calls from deployment to fully secured.
See deployment guide
Ultimately, the IT administrator decides what should be allowed to run. ThreatLocker’s learning process will create a list of policies, which can be reviewed and amended before protection is enabled and systems are secured. ThreatLocker® does not allow applications simply because the vendor is approved. From a cybersecurity perspective, the fewer applications permitted to run in an environment, the better. Allowing all applications by a specific vendor or vendors, flies in the face of this approach.
ThreatLocker support is available 24/7/365 and is accessed via a chat function on the portal. All chats are answered within 60 seconds, and our Cyber Hero Team can assist via chat or Zoom. We also have an extremely comprehensive knowledge base, as well as ThreatLocker® University, which provides self-paced, a la carte courses or predetermined learning tracks up to Cyber Hero Certification.
To learn more about how ThreatLocker's Application Allowlisting can help you enhance your cybersecurity stack, reach out to our Cyber Hero Team today.
ThreatLocker® runs at the kernel level, meaning it doesn’t matter if something is executed by an administrator, system, or user, if it hasn’t been allowed to run via the Allowlist, it will be blocked.
ThreatLocker® also has extremely stringent Tamper Protection, which, combined with its kernel level services, makes it nearly impossible to interfere with its operation.
When using allowlisting, changes to the application may be blocked if the application updates. ThreatLocker® solves this problem by having a predefined list of built-in application definitions. If you have a policy for a built-in application, ThreatLocker® will automatically update the policy when new updates are released. Our team monitors over 2,000 tracked applications and updates the definitions 24/7.
For unknown applications that are automatically updated, you can create custom rules and definitions using a combination of hashes, filenames, calling processes, certificates, and creating processes. If the IT team deploys the update, installation mode can be used to track the changes by the installer.
Permitting new applications is an extremely smooth process. A blocked file can be requested, evaluated, approved, and allowed to run within 60 seconds.