ThreatLocker: Zero Trust vs Malware & Exploits

preview_player
Показать описание
Testing Threatlocker vs Malware to see if zero trust is an effective strategy for the future to prevent hacking attempts. The test includes pdf exploits, commands to simulate attacks etc. and a discussion of protection approaches. Is this a better or worse approach than detection?

ThreatLocker is one of the members of our annual Mal X programme so they receive additional test reports and data from us. However, all public tests are conducted fully independently with no interference.

Рекомендации по теме
Комментарии
Автор

it seems it the best solution to keep non tech savvy employees safe and make sure they're not doing something they're not suppose to do

truelies
Автор

I'd say a combination of both would be ideal

thewaking
Автор

o hey, finally a solution that has any real chance of catching a 0 day. My personal go-to is always ida Pro and a VM/sandbox, this is basically that but on a company scale.

nezu_cc
Автор

thats what we use in our organization. Works pretty well

henryijeoma
Автор

I think both an allow listing and detection based system are necessary. As far as making sure execution is secure, allow listing is the way to go... It just can be difficult for some jobs.

speedymemes
Автор

When Part 2 of "Best Antivirus/EDR vs Unknown Ransomware" with Kaspersky etc?

Zero-smoi
Автор

So since it works in a different way than a typical Anti virus and firewall program, does that mean you can have both on your system without conflicts ?

RogueDK
Автор

Thanks for the good video!
Could you make a video about Sandboxie-Plus and whether it makes sense to use it?

its_trexic
Автор

Can you use your knowledge to test how good Sandboxie Plus virtualization is and how it keeps spaces isolated from malware?

veyzneg
Автор

I would be curious to see you testing Kaseya/Datto AV + EDR + Ransomware solutions!

frankypelletier
Автор

zero trust is definitely the way to got for an entreprise environment. 100% of the times any type of virus infects a company is because of user error, be it downloading and opening a file they received on an email or just poor security practices (Ie no firewalls or whatever). For a single home user though, this creates waaaay more problems and solutions. I installed "Simple Wall" the other day because of your video on "How to stop apps from spying on Windows" and omfg was it triggering. I couldn't open absolutely any program without having to add each individual .exe related to it on Simple Wall.

vrkn
Автор

So whats is the price of this . they dont say anything on their site, which makes me suspicious

manuelthallinger
Автор

Allowing you to run PowerShell as Admin is a gap in your configuration; a standard user should not be allowed to elevate PowerShell in the first place; that's what Elevation Control is for.

carlschneider
Автор

AppLocker/WDAC tests when?

Jokes aside, I hope you cover them as well

tablettablete
Автор

I use Threatlocker for my job, and while it's a good protector, you do have to put quite some work into it to properly configure applications so they're both protected, but still work.

ym
Автор

Could you do a video (and a tutorial on what to block to protect ourselves from ost threats without breaking windows) on AppLocker?

williamshevr
Автор

Great video!!! I like this approach (zero trust approach). What I want to know is will this perform better than UltraAV? :D lol Thanks for posting!!!

TheCocoaDaddy
Автор

Oh man. would love that software for the house. But looks like its going to have enterprise pricing.

alfblack
Автор

Unfortunately we'd need the benefits of both.

obtrunco
Автор

Thats actually almost the same as Kaspersky's Intrusion Prevention, it literally does the same thing lol.

Zero-smoi