-
ThreatLocker as a NIST 800-171 r1 ControlView in Browser ThreatLocker's tools can assist your organization when you are working towards becoming NIST 800-171 r1 compliant. ThreatLocker can be used as the control for specific practices, and assist in meeting other practices either by providing tools that can be used to help other applications meet the practice or by the ThreatLocker product itself meeting the practice. 3.1 Access Control Basic Security Requirements 3.1.1 - "Limit system access to authorized users, processes acting on behalf of authorized users, or devices (including other systems).
-
ThreatLocker as an Essential Eight Maturity Model Mitigation StrategyCorrected 6/1/2022 View in Browser Level 1 Application Control Description - "The execution of executables, software libraries, scripts, installers, compiled HTML, HTML Applications and control panel applets are prevented on workstations from within standard user profiles and temporary folders used by the operating system, web browsers and email clients." ThreatLocker helps meet this mitigation strategy. Utilizing Application Control, ThreatLocker enables the blocking of executables, installers, scripts, and software libraries on any endpoint by specific users or all users, specific folders or all folders, and specific Applications or all Applications.
-
ThreatLocker as an ISO 27001 Annex A ControlView in Browser Annex A.6 - Organization of Information Security 6.1.2 Segregation of Duties ThreatLocker can help create a least-privileged environment using Application Control by restricting what applications can run, who can use them, and when. Ringfencing can restrict the function of applications down to only what is necessary for business. Storage Control can allow you to block access to folders and files and only permit access to specific applications that need to access those areas.
-
ThreatLocker as a CMMC Compliance ControlView in Browser ThreatLocker's tools can assist your organization when you are working towards becoming CMMC compliant. ThreatLocker can be used as the control for specific practices, and assist in meeting other practices either by providing tools that can be used to help other applications meet the compliance level practice or by the ThreatLocker product itself meeting the practice. Access Control (AC) Domain C001 - Establish system access requirements Level 1 - "
-
ThreatLocker and ITAR ComplianceWhile there is no formal ITAR certification, ThreatLocker is committed to supporting our customers that need to maintain ITAR compliance. In addition to providing a US-based Support Team that is available 24/7/365, ThreatLocker enables users to specify organizations that need to remain ITAR compliant, ensuring that ThreatLocker employees who are not US citizens do not access their data. Navigate to the 'Organizations' page. Select the 'Edit' button next to any organization that needs to remain ITAR compliant.
-
ThreatLocker and GLBA ComplianceIntroduction ThreatLocker's tools can assist your organization in becoming compliant with the United States Federal Trade Commission’s (FTC) Gramm-Leach-Bliley Act (GLBA) Safeguards Rule. ThreatLocker can be used to meet specific requirements and can provide tools to support meeting other requirements. Summary The standards outlined in the first publication of the GLBA Safeguards Rule include broad and non-prescriptive security requirements that financial institutions must meet to become compliant with the law.
-
ThreatLocker & PIPEDA ComplianceIntroduction ThreatLocker's tools can assist your organization when you are working towards becoming PIPEDA (Personal Information Protection and Electronic Documents Act) compliant. ThreatLocker can be used to satisfy specific Principles and can assist in meeting other Principles by providing supporting tools and information. Summary PIPEDA’s 10 fair information principles form the ground rules for the collection, use and disclosure of personal information, as well as for providing access to personal information.