➡ Allow what you need, block everything else with ThreatLocker: threatlocker.com In this episode, I speak with Slava Konstantinov, ThreatLocker's MacOS Lead Architect, about their zero-trust approach to endpoint security and their latest cybersecurity innovations. We talk about: • ThreatLocker’s Zero Trust Approach to Cybersecurity: How ThreatLocker enforces a default deny security model, ensuring only explicitly allowed applications and actions can run, reducing attack surfaces and unauthorized access. • Key ThreatLocker Products and Features: How ThreatLocker’s solutions—Application Control, Storage Control, Ring Fencing, Network Control, and ThreatLocker Detect—help organizations enhance security through granular policy enforcement. • New & Upcoming ThreatLocker Features: How new solutions like Patch Management, Web Control, Insights, and Cloud Detect will provide even greater security, automation, and compliance for businesses managing complex IT environments. Chapters: 00:00 - Intro to ThreatLocker and Zero Trust Security 01:24 - How ThreatLocker’s Application Control Blocks Unauthorized Software 06:52 - Storage Control: Preventing Unauthorized Data Access and USB Threats 08:19 - Ring Fencing: Controlling App Permissions and Network Access 12:37 - Elevation Control: Granting Admin Privileges Without Risk 16:23 - Network Control: Restricting Internet and Internal Network Access 19:26 - AI-Driven Security Policies: The Future of ThreatLocker Management 24:07 - Mac vs. Windows Security: Key Differences and Challenges 29:49 - ThreatLocker’s Expansion: New Products and Future Plans 32:32 - Where to Learn More About ThreatLocker’s Security Solutions
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.
Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Dansk
Danmark