Particle.news
Download on the App Store

ThreatLocker Adds Device‑Verified Network and Cloud Access to Its Zero Trust Platform

The launch ties sign-ins to approved hardware via a company-run broker to blunt phishing-driven credential misuse.

Overview

  • ThreatLocker announced the new capability on March 5 at its Zero Trust World event, expanding its deny-by-default approach beyond endpoints.
  • Access now requires valid credentials, an approved device, and connection through a ThreatLocker-managed broker, with attempts blocked if any element is missing.
  • The controls extend to major SaaS platforms, including Salesforce, Microsoft 365, Asana, Google Workspace, and GitHub, by validating devices before connections are allowed.
  • The company says deployments can be completed in as little as 30 minutes and touts granular access policies, secure remote desktop without open ports, and FIPS support.
  • ThreatLocker frames the update as completing a unified Zero Trust stack designed to reduce alert fatigue, and its CEO highlighted phishing risks by noting five employees fell for a staged test.