A list of permissions used to control network traffic.
The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.
A computer program that carries out a task in the background.
A barrier between an organization’s digital assets and the internet or other networks.
A specific set of instructions a computer must follow to perform a calculation or solve a problem.
Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.
Learn More About Application Allowlisting
Software that allows you to perform a specific function on your desktop or mobile devices. Applications can include word processors, internet browsers, and media players.
When an application is running in an environment, it has access to everything in that environment, such as sensitive files, and on networked devices, this includes everything on the network.
An Application Definition is the set of files and any custom rules that make up a particular application.
Occur when cyber threat actors take advantage of any vulnerabilities within an application, usually to enter your devices or organization.
A software designed to hunt and remove viruses from your device(s) or block viruses from entering in the first place.
An audit event refers to any security relevant occurrence within a system.
A file containing a collection of audit events.
Verifying the identity of a user or process.
Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.
Tools that are included in the basic platform functionality without any modifications.
Refers to a policy that allows employees within an organization to use their personal devices to connect to the organizations’ networks. The device is used to complete tasks necessary to complete their job which can potentially be sensitive or confidential.
A physical or virtual device that can imitate most other physical and virtual devices. They can be used to lure attackers for users to study their behaviors.
Systems, applications, and operations that are cloud-based are hosted or conducted via the internet.
The ability to personalize settings to better fit a specific task/need.
A computer that an attacker will use to communicate with and control devices they have taken over.
Any attempt to infiltrate an individual’s or organization’s data storage or information systems usually for destructive purposes or financial gain.