Co-located with The Emergency Services Show

Exhibitor Products

04 Jul 2023

Ringfencing

Why Ringfencing™?

Under normal operations, all applications permitted on an endpoint or server can access all data that the operating user can access. This means if the application is compromised, the attacker can use the application to steal or encrypt files. Ringfencing™ allows you to remove file access permissions for applications that do not need access and even remove network or registry permissions.

How Does Ringfencing™ Work?

When you first deploy Ringfencing™, your device will automatically be aligned with the default ThreatLocker® policies. These policies are then automatically applied to a list of known applications such as Microsoft Office, PowerShell, or Zoom. The aim of the default policies is to provide a baseline level of protection for all endpoints. Each of these policies can easily be manipulated to fit any environment at any time. Our dedicated Cyber Hero Team is always on hand to support any requests, 24/7/365.

Loading