How to Implement Zero Trust On Your Endpoints Pt. 2
ThreatLocker® is a leader in endpoint security technologies, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Allowlisting, Ringfencing™, Storage Control, Elevation Control, and Endpoint Network Access Control (NAC) solutions are leading the cybersecurity market toward a more secure approach to blocking the exploits of unknown application vulnerabilities. For More on ThreatLocker®: ThreatLocker Website: https://threatlocker.com/?utm_source=youtube&utm_medium=youtubevideodescription&utm_campaign=2021-ytvideo&utm_content=howtoimplementzerotrustonyourendpointspart2 Book a Demo Today: https://threatlocker.com/demo-sign-up?utm_source=youtube&utm_medium=youtubevideodescription&utm_campaign=2021-ytvideo&utm_content=howtoimplementzerotrustonyourendpointspart2 Facebook: https://www.facebook.com/thethreatlocker/ LinkedIn: https://www.linkedin.com/company/threatlockerinc/ Twitter: https://twitter.com/ThreatLocker?s=20 Instagram: https://www.instagram.com/threatlocker/ YouTube: https://www.youtube.com/c/ThreatLocker 00:00 Introduction/Recap of part 1 00:50 - Addressing recent exploits 03:49 - An example of PowerShell's capabilities 05:56 - How ThreatLocker RIngfences PowerShell 08:55 - The idea behind controls on your endpoints 09:19 - Outro Watch part 1 here: https://youtu.be/pQNe7nRxZd8 ©2021 ThreatLocker Inc., All Rights Reserved.
Download
0 formatsNo download links available.