Treceți offline cu aplicația Player FM !
Resilient Cyber w/ Rob Allen - Endpoint Protection, VulnMgt & Zero Trust
Manage episode 435130154 series 2947250
- For those not familiar with you and ThreatLocker, can you tell us a bit about yourself and the ThreatLocker team?
- When we look out at the endpoint protection landscape, what do you feel some of the most pressing threats and risks are?
- There of course has been a big push for Zero Trust in the industry being led by CISA, NIST, and industry. How does ThreatLocker approach Zero Trust when it comes to the Endpoint Protection Platform?
- Another thing that caught my eye is the ThreatLocker Allowlisting capability. We know Applications remain one of the top attack vectors per sources such as the DBIR. Can you tell us about the ThreatLocker Allowlisting capability and blocking malicious app activity on endpoints?
- Taking that a step further, you all often speak about your Ringfencing capability that deals with Zero Day vulnerabilities. As we know, traditional vulnerability management tools can't stop Zero Day exploits. How does the ThreatLocker platform handle Zero Day protection?
- I saw you all recently had a webinar focused on CMMC and NIST 800-171, which applies to the Defense Industrial Base. Obviously endpoint threats are a big concern there for the DoD and the DIB. Can you talk about how ThreatLocker is working with that community?
- For folks wanting to learn more about ThreatLocker, where should they go, and what are some things to keep an eye out for?
Find out more about ThreatLocker!
142 episoade
Manage episode 435130154 series 2947250
- For those not familiar with you and ThreatLocker, can you tell us a bit about yourself and the ThreatLocker team?
- When we look out at the endpoint protection landscape, what do you feel some of the most pressing threats and risks are?
- There of course has been a big push for Zero Trust in the industry being led by CISA, NIST, and industry. How does ThreatLocker approach Zero Trust when it comes to the Endpoint Protection Platform?
- Another thing that caught my eye is the ThreatLocker Allowlisting capability. We know Applications remain one of the top attack vectors per sources such as the DBIR. Can you tell us about the ThreatLocker Allowlisting capability and blocking malicious app activity on endpoints?
- Taking that a step further, you all often speak about your Ringfencing capability that deals with Zero Day vulnerabilities. As we know, traditional vulnerability management tools can't stop Zero Day exploits. How does the ThreatLocker platform handle Zero Day protection?
- I saw you all recently had a webinar focused on CMMC and NIST 800-171, which applies to the Defense Industrial Base. Obviously endpoint threats are a big concern there for the DoD and the DIB. Can you talk about how ThreatLocker is working with that community?
- For folks wanting to learn more about ThreatLocker, where should they go, and what are some things to keep an eye out for?
Find out more about ThreatLocker!
142 episoade
Semua episode
×Bun venit la Player FM!
Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.