Average Ratings 0 Ratings
Average Ratings 464 Ratings
Description
Streamlining privileges while enhancing access control for Windows, Mac, Unix, Linux, and network devices can be achieved without compromising on productivity. With extensive experience managing over 50 million endpoints, we have developed a deployment strategy that ensures rapid return on investment. Whether deployed on-premise or in the cloud, BeyondTrust allows for the swift and efficient removal of admin rights, all while keeping user productivity intact and minimizing the number of service desk inquiries. Unix and Linux systems, along with network devices like IoT, ICS, and SCADA, are particularly attractive targets for both external threats and internal malicious actors. By obtaining root or other elevated credentials, attackers can discreetly navigate through systems to access sensitive information. BeyondTrust Privilege Management for Unix & Linux stands out as a robust, enterprise-level solution that empowers security and IT teams to maintain compliance effectively. Furthermore, this solution not only safeguards valuable assets but also fosters a secure environment for users to operate efficiently.
Description
For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land.
Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center.
API Access
Has API
API Access
Has API
Integrations
ThreatAware
AriLinc
Auth0
Axonius
ConnectWise ScreenConnect
Datto SaaS Protection
HaloPSA
IT Glue
InsightAppSec
Intellicta
Integrations
ThreatAware
AriLinc
Auth0
Axonius
ConnectWise ScreenConnect
Datto SaaS Protection
HaloPSA
IT Glue
InsightAppSec
Intellicta
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
BeyondTrust
Founded
1985
Country
United States
Website
www.beyondtrust.com/privilege-management
Vendor Details
Company Name
ThreatLocker
Founded
2017
Country
United States
Website
www.threatlocker.com
Product Features
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Firewall
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Access Control (NAC)
Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring