ThreatLocker and Third Wall Commit to Stronger Endpoint Security


ThreatLocker and Third Wall Commit to Stronger Endpoint Security

By Greg Tavarez

Ransomware and other forms of cyberattacks continue to become more sophisticated and compromise the security of user endpoints – and by extension, entire corporate operations. As activities and workloads take place on company endpoints nonstop, it is vital for security practitioners to protect endpoint devices everywhere by blocking threats.

ThreatLocker provides enterprise-level cybersecurity tools to improve the security of servers and endpoints. Tools include ThreatLocker's Allowlisting and Ringfencing solutions.

Allowlisting only permits approved files to execute and blocks everything else. It gives IT professionals control over their IT environments by letting them manage what software is allowed to run and blocking malicious software.

Ringfencing enables IT professionals to limit interactions between applications, their access to files, the registry and the internet. What Ringfencing essentially does is helps protect customers against the weaponization of trusted applications while mitigating risks posed by vulnerabilities.

ThreatLocker, lloking to provide these tools to MSPs and is now doing exactly that after acquiring Third Wall, an automated lockdown security plug-in for ConnectWise Automate users. Third Wall applies 58 automated policies and monitoring to make a system more secure. This is done by creating a record of every user login, logoff, unlock, lock and failed login events.

The addition of Third Wall's lockdown policies to ThreatLocker existing solutions, such as Allowlisting and Ringfencing, enable MSPs to harden Windows operating systems, ensure end-users comply with government regulations and strengthen overall security posture.

“This new partnership with Third Wall will allow ThreatLocker to deploy emergency actions and ensure users are HIPAA, PCI, NIST, GDPR and SOX compliant," said Danny Jenkins, CEO of ThreatLocker.

Third Wall's migration serves as a tool to protect a business's sensitive data and promotes a strong cybersecurity posture. This acquisition also allows seamless integration with remote monitoring management software such as ConnectWise, Kaseya and Atera.

"ThreatLocker's deny by default approach, coupled with their ransomware prevention techniques, are a perfect fit," said Scott Springer, CEO of Third Wall. "ThreatLocker's global reach and 24/7 support will further bolster the Third Wall plug-in and give MSPs that competitive edge to strengthen their security offerings."

The Third Wall team, once integrated into ThreatLocker's organization, is keen on building and expanding the endpoint security use cases that they already taken to market.

ThreatLocker is a Platinum sponsor of MSP Expo 2023, taking place in Ft. Lauderdale, Florida, Feb. 14-17, 2023. MSP Expo is part of the #TECHSUPERSHOW, which  includes nearly a dozen collocated business technology events that bring buyers, users, sellers and partners together under one roof to educate, network, and build business relationships around the technologies driving business success today. ThreatLocker will be in Booth #846 in the exhibit hall.

Edited by Erik Linask

MSPToday Editor

Related Articles

Cyberattack Protection, Detection, and Recovery with SaaS

By: Greg Tavarez    11/23/2022

DataHawk from Cohesity is a data security SaaS solution that helps customers protect, detect and recover from cyberattacks and ransomware attacks.

Read More

Cloud Marketplace Innovator Pax8 Ranks 131 on the Deloitte Technology Fast 500

By: Juhi Fadia    11/23/2022

Pax8 has been named in the Deloitte Technology Fast 500 among the fastest-growing technology, media, telecommunications, life sciences, fintech, and e…

Read More

Arizona Department of Homeland Security Picks Tanium for Cybersecurity

By: Stefania Viscusi    11/22/2022

With a new, state-of-the-art cybersecurity solution from Tanium, AZDOHS is able to better share key information in real time, creating a stronger secu…

Read More

IT Teams Fall Short in Microsoft 365 Security Protections

By: Greg Tavarez    11/21/2022

A surprising number of enterprises have major gaps in the Microsoft security policies and practices, leading to unnecessary risks.

Read More

Phishing Attacks Sprout from Unexpected Places

By: Greg Tavarez    11/21/2022

Users more frequently click on phishing links that arrive through other channels, including personal websites and blogs, social media, and search engi…

Read More