Go offline with the Player FM app!
Resilient Cyber w/ Rob Allen - Endpoint Protection, VulnMgt & Zero Trust
Manage episode 435130154 series 2947250
- For those not familiar with you and ThreatLocker, can you tell us a bit about yourself and the ThreatLocker team?
- When we look out at the endpoint protection landscape, what do you feel some of the most pressing threats and risks are?
- There of course has been a big push for Zero Trust in the industry being led by CISA, NIST, and industry. How does ThreatLocker approach Zero Trust when it comes to the Endpoint Protection Platform?
- Another thing that caught my eye is the ThreatLocker Allowlisting capability. We know Applications remain one of the top attack vectors per sources such as the DBIR. Can you tell us about the ThreatLocker Allowlisting capability and blocking malicious app activity on endpoints?
- Taking that a step further, you all often speak about your Ringfencing capability that deals with Zero Day vulnerabilities. As we know, traditional vulnerability management tools can't stop Zero Day exploits. How does the ThreatLocker platform handle Zero Day protection?
- I saw you all recently had a webinar focused on CMMC and NIST 800-171, which applies to the Defense Industrial Base. Obviously endpoint threats are a big concern there for the DoD and the DIB. Can you talk about how ThreatLocker is working with that community?
- For folks wanting to learn more about ThreatLocker, where should they go, and what are some things to keep an eye out for?
Find out more about ThreatLocker!
145 episodes
Manage episode 435130154 series 2947250
- For those not familiar with you and ThreatLocker, can you tell us a bit about yourself and the ThreatLocker team?
- When we look out at the endpoint protection landscape, what do you feel some of the most pressing threats and risks are?
- There of course has been a big push for Zero Trust in the industry being led by CISA, NIST, and industry. How does ThreatLocker approach Zero Trust when it comes to the Endpoint Protection Platform?
- Another thing that caught my eye is the ThreatLocker Allowlisting capability. We know Applications remain one of the top attack vectors per sources such as the DBIR. Can you tell us about the ThreatLocker Allowlisting capability and blocking malicious app activity on endpoints?
- Taking that a step further, you all often speak about your Ringfencing capability that deals with Zero Day vulnerabilities. As we know, traditional vulnerability management tools can't stop Zero Day exploits. How does the ThreatLocker platform handle Zero Day protection?
- I saw you all recently had a webinar focused on CMMC and NIST 800-171, which applies to the Defense Industrial Base. Obviously endpoint threats are a big concern there for the DoD and the DIB. Can you talk about how ThreatLocker is working with that community?
- For folks wanting to learn more about ThreatLocker, where should they go, and what are some things to keep an eye out for?
Find out more about ThreatLocker!
145 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.