Speakers
Danny Jenkins
CEO & co-founder
ThreatLocker
Rob Allen
CPO
ThreatLocker
This webinar, led by ThreatLocker, is a practical deep dive into ThreatLocker Ringfencing™ and how it limits what trusted applications are allowed to do once they are running. The session explores how to reduce attack surface by restricting applications from accessing files, the internet, registry locations, and other processes they do not need. Speakers will walk through real-world examples, including PowerShell, Microsoft Office, browsers, and common utilities, and demonstrate how Ringfencing can stop exploitation even when vulnerabilities or backdoors exist. Live demos will also show how to build, test, and refine Ringfencing policies without breaking legitimate workflows.
What you will learn:
How Ringfencing reduces risk after execution, even for trusted software. See how to identify what an application actually needs for access, how to use auto-population and monitoring to build accurate policies, and how to avoid over-permissive configurations. The session also covers how to restrict dangerous tools, how to prevent applications from launching other high-risk processes, and how to contain exploitation paths that antivirus cannot see.
Key topics covered:
Request a demo to see how ThreatLocker can strengthen your defenses across applications, configurations, and every endpoint you manage.
CEO & co-founder
ThreatLocker
CPO
ThreatLocker
Email us at [email protected]