We'll review steps you can take to protect devices no matter where they connect, including:
•Inventory, monitor and control applications: Ensure your company has the capability to limit what applications are on machines, and what these applications may have access to through Ringfencing
•Protect inbound traffic to remote devices: Protect your east-west traffic on the endpoints with a robust endpoint firewall tool leveraging Dynamic ACLs (Dynamic Port Management). Block all inbound traffic and only allow limited outbound traffic through common ports
•Detect any indications of compromise: Pair these controls with an in-depth detection tool (ThreatLocker Detect) that watches for potential malicious behavior and alert/automate responses to these behaviors both on the Endpoint and in your M365 environment with Cloud Detect/Control
•Manage Web Content on machines off the company network with Web Control
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
As a ThreatLocker Solutions Engineer, Erik Jansen focuses on fortifying digital assets through cutting-edge cybersecurity solutions. With a dedication to Zero Trust principles, Erik specializes in application, network, and storage control, as well as EDR and MDR deployment. His role encompasses not just technical understanding but also customer success, ensuring that the cybersecurity products we deliver are seamlessly integrated and effective.








