In this interview from Zero Trust World 2026, ThreatLocker's Erik Jansen discusses securing the remote workforce.We'll review steps you can take to protect devices no matter where they connect, including:Inventory, monitor and control applications: Ensure your company has the capability to limit what applications are on machines, and what these applications may have access to through RingfencingProtect inbound traffic to remote devices: Protect your east-west traffic on the endpoints with a robust endpoint firewall tool leveraging Dynamic ACLs (Dynamic Port Management). Block all inbound traffic and only allow limited outbound traffic through common portsDetect any indications of compromise: Pair these controls with an in-depth detection tool (ThreatLocker Detect) that watches for potential malicious behavior and alert/automate responses to these behaviors both on the Endpoint and in your M365 environment with Cloud Detect/ControlManage Web Content on machines off the company network with Web ControlThis segment is sponsored by Zero Trust World.Visit https://securityweekly.com/ztw to see all of our coverage of this event!Show Notes: https://securityweekly.com/ztw26-1
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
Related Terms
Asymmetric WarfareYou can skip this ad in 5 seconds



