ThreatLocker launches new community-driven threat detection tool, ThreatLocker Ops

ThreatLocker, has recently announced the launch of ThreatLocker Ops, a that assists administrators to detect attempted breaches or weaknesses in their systems.

“Zero Trust is the required foundation of security for all organizations,” said Danny Jenkins, CEO & Co-Founder of ThreatLocker. “By combining controls with Ops, organizations are not only able to benefit from knowledge ThreatLocker has received of attempted attacks but from similar businesses  defending their system from these attacks.”

Ops is a policy-driven system that uses data received from the ThreatLocker agent to determine good or bad behavior. This data can be used to alert I.T. administrators of attempted attacks or to trigger actions to further harden an environment using other components of the platform. The Ops platform also integrates into ThreatLocker’s new community, which allows like-kind businesses to public policies that are relevant to their business, which allows for information sharing and a more extensive set of alerts.

Ops limits reliance on other IT resources with more security controls, less agent fatigue, and no overhead on personal computers (PCs).

ThreatLocker also announces the integration of Third Wall plug-in in its zero trust platform. This announcement follows the acquisition of Third Wall last November.

The powerful configurations manager for Windows consists of 58 lockdown policies and emergency actions to broaden the scope of ransomware prevention and ensure users are HIPAA, PCI, NIST, and GDPR compliant.

“The future of Zero Trust is simple; more controls, more automation, more alerts and the help and support of the community,” said Danny.

ThreatLocker’s new additions satisfy many government regulations on implementing Zero Trust strategies to prevent modern-day attacks.