Zero Trust World, Zero trust

Securing remote workforce with ThreatLocker’s Erik Jansen

In this interview from Zero Trust World 2026, ThreatLocker's Erik Jansen discusses securing the remote workforce.

We'll review steps you can take to protect devices no matter where they connect, including:

Inventory, monitor and control applications: Ensure your company has the capability to limit what applications are on machines, and what these applications may have access to through Ringfencing

Protect inbound traffic to remote devices: Protect your east-west traffic on the endpoints with a robust endpoint firewall tool leveraging Dynamic ACLs (Dynamic Port Management). Block all inbound traffic and only allow limited outbound traffic through common ports

Detect any indications of compromise: Pair these controls with an in-depth detection tool (ThreatLocker Detect) that watches for potential malicious behavior and alert/automate responses to these behaviors both on the Endpoint and in your M365 environment with Cloud Detect/Control

Manage Web Content on machines off the company network with Web Control

This segment is sponsored by Zero Trust World.

Visit https://securityweekly.com/ztw to see all of our coverage of this event!

Show Notes: https://securityweekly.com/ztw26-1

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

Related Terms

Asymmetric Warfare

You can skip this ad in 5 seconds