ThreatLocker - What is it, how does it work, and why do we have it?

 

NOTE:  Submitted requests are evaluated and responded to Monday - Friday 8AM-5PM

Introduction

ThreatLocker is a robust cybersecurity solution designed to protect organizations by controlling and managing applications and devices. It offers advanced security features that help protect against ransomware, malware, and other cyber threats.

What is ThreatLocker?

ThreatLocker is an application allow-listing and endpoint security tool that allows organizations to control which applications can run on their systems. By implementing a zero-trust approach, ThreatLocker ensures that only approved, safe applications can execute, thereby reducing the risk of malicious software infiltrating the network.

How Does ThreatLocker Work?

ThreatLocker operates using a combination of application Allow-listing, ringfencing, and storage control:

Application Allow-listing

Application allow-listing is the primary feature of ThreatLocker. It involves creating a list of pre-approved applications that are allowed to run on the network. Any application not on the allowlist is automatically blocked, significantly reducing the potential for unauthorized or harmful software to execute.

Ringfencing

Ringfencing is a security measure that restricts the actions of applications, even those that are allow-listed. It limits the ability of applications to interact with each other, preventing them from making unauthorized changes or accessing sensitive data. This containment strategy ensures that even if a allow-listed application is compromised, its potential damage is minimized.

Why Deploy ThreatLocker at FSU College of Medicine?

The deployment of ThreatLocker at FSU College of Medicine is driven by the need to enhance cybersecurity and protect sensitive information. Here are the key reasons for its implementation:

Protecting Sensitive Data

As a medical institution, FSU College of Medicine handles a vast amount of sensitive data, including patient records, research data, and personal information. ThreatLocker helps protect this data by preventing unauthorized applications from accessing or tampering with it.

Mitigating Cyber Threats

Cyber threats such as ransomware and malware pose significant risks to any organization. By employing application allow-listing and ringfencing, ThreatLocker minimizes the attack surface, making it harder for cybercriminals to infiltrate the network and cause harm.

Ensuring Compliance

The healthcare industry is subject to stringent regulations and standards for data security. Deploying ThreatLocker helps FSU College of Medicine comply with these regulations by providing robust security controls and detailed logging of application activity.

Maintaining Operational Integrity

The ability to control and monitor applications ensures that the systems at FSU College of Medicine remain secure and functional. ThreatLocker prevents unauthorized software from disrupting operations, ensuring that the institution can continue to provide critical services without interruption.

Conclusion

ThreatLocker is a powerful tool in the fight against cyber threats, offering advanced security features that protect FSU College of Medicine's sensitive data and maintain operational integrity. By implementing ThreatLocker, the institution ensures a higher level of cybersecurity, compliance with regulations, and the safeguarding of its critical data assets.