Overview
- ThreatLocker announced the new capability on March 5 at its Zero Trust World event, expanding its deny-by-default approach beyond endpoints.
- Access now requires valid credentials, an approved device, and connection through a ThreatLocker-managed broker, with attempts blocked if any element is missing.
- The controls extend to major SaaS platforms, including Salesforce, Microsoft 365, Asana, Google Workspace, and GitHub, by validating devices before connections are allowed.
- The company says deployments can be completed in as little as 30 minutes and touts granular access policies, secure remote desktop without open ports, and FIPS support.
- ThreatLocker frames the update as completing a unified Zero Trust stack designed to reduce alert fatigue, and its CEO highlighted phishing risks by noting five employees fell for a staged test.