
Sign up to save your podcasts
Or
➡ Allow what you need, block everything else with ThreatLocker:
threatlocker.com
In this episode, I speak with Slava Konstantinov, ThreatLocker's MacOS Lead Architect, about their zero-trust approach to endpoint security and their latest cybersecurity innovations.
We talk about:
• ThreatLocker’s Zero Trust Approach to Cybersecurity:
How ThreatLocker enforces a default deny security model, ensuring only explicitly allowed applications and actions can run, reducing attack surfaces and unauthorized access.
• Key ThreatLocker Products and Features:
How ThreatLocker’s solutions—Application Control, Storage Control, Ring Fencing, Network Control, and ThreatLocker Detect—help organizations enhance security through granular policy enforcement.
• New & Upcoming ThreatLocker Features:
How new solutions like Patch Management, Web Control, Insights, and Cloud Detect will provide even greater security, automation, and compliance for businesses managing complex IT environments.
Chapters:
00:00 - Intro to ThreatLocker and Zero Trust Security
01:24 - How ThreatLocker’s Application Control Blocks Unauthorized Software
06:52 - Storage Control: Preventing Unauthorized Data Access and USB Threats
08:19 - Ring Fencing: Controlling App Permissions and Network Access
12:37 - Elevation Control: Granting Admin Privileges Without Risk
16:23 - Network Control: Restricting Internet and Internal Network Access
19:26 - AI-Driven Security Policies: The Future of ThreatLocker Management
24:07 - Mac vs. Windows Security: Key Differences and Challenges
29:49 - ThreatLocker’s Expansion: New Products and Future Plans
32:32 - Where to Learn More About ThreatLocker’s Security Solutions
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.
4.6
134134 ratings
➡ Allow what you need, block everything else with ThreatLocker:
threatlocker.com
In this episode, I speak with Slava Konstantinov, ThreatLocker's MacOS Lead Architect, about their zero-trust approach to endpoint security and their latest cybersecurity innovations.
We talk about:
• ThreatLocker’s Zero Trust Approach to Cybersecurity:
How ThreatLocker enforces a default deny security model, ensuring only explicitly allowed applications and actions can run, reducing attack surfaces and unauthorized access.
• Key ThreatLocker Products and Features:
How ThreatLocker’s solutions—Application Control, Storage Control, Ring Fencing, Network Control, and ThreatLocker Detect—help organizations enhance security through granular policy enforcement.
• New & Upcoming ThreatLocker Features:
How new solutions like Patch Management, Web Control, Insights, and Cloud Detect will provide even greater security, automation, and compliance for businesses managing complex IT environments.
Chapters:
00:00 - Intro to ThreatLocker and Zero Trust Security
01:24 - How ThreatLocker’s Application Control Blocks Unauthorized Software
06:52 - Storage Control: Preventing Unauthorized Data Access and USB Threats
08:19 - Ring Fencing: Controlling App Permissions and Network Access
12:37 - Elevation Control: Granting Admin Privileges Without Risk
16:23 - Network Control: Restricting Internet and Internal Network Access
19:26 - AI-Driven Security Policies: The Future of ThreatLocker Management
24:07 - Mac vs. Windows Security: Key Differences and Challenges
29:49 - ThreatLocker’s Expansion: New Products and Future Plans
32:32 - Where to Learn More About ThreatLocker’s Security Solutions
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.
1,961 Listeners
363 Listeners
634 Listeners
369 Listeners
1,006 Listeners
313 Listeners
387 Listeners
7,836 Listeners
142 Listeners
182 Listeners
310 Listeners
72 Listeners
120 Listeners
33 Listeners
159 Listeners