
Cyber security company ThreatLocker has released new solutions that further advance the security and efficiency of its platform. ThreatLocker made the announcement at Zero Trust World 2025 in Florida.
Designed to tackle the evolving threat landscape and the increasing complexity of cyber security, these innovations meet the rising demand for effective, cost-efficient, and user-friendly security solutions.
“We’re redefining Zero trust – making it accessible, practical, and easier to manage,” ThreatLocker CEO and Co-founder Danny Jenkins. “The solutions reduce friction, boost automation, and change how people view deny-by-default, allow-by-exception security. These latest innovations make zero trust even simpler and more efficient, proving our commitment to innovation and usability.”
ThreatLocker’s new cyber security solutions include:
ThreatLocker Insights
Designed to leverage data from millions of endpoints worldwide, this solution provides organisations with the intelligence needed to swiftly make the best security decisions. With real-time, actionable insights at their fingertips, cyber security professionals can now skip tedious research and instantly view an application’s typical behaviour.
This allows them to make fast, informed decisions on what to allow and how to control it in their environments, strengthening their cybersecurity posture without time-consuming research and guesswork.
ThreatLocker Patch Management
ThreatLocker Patch Management eliminates the burden of monitoring and researching software updates, one less thing for cybersecurity pros to worry about. Instead of sifting through multiple sources for alerts, everything is consolidated into a single, streamlined platform, managed by ThreatLocker. To ensure every update is safe and reliable, the ThreatLocker Cyber Hero Team rigorously tests each one in a controlled environment before deployment so businesses stay secure without the risk of disruptions.
ThreatLocker User Store
The ThreatLocker User Store is a catalogue of pre-approved applications that lets users run the apps they need without compromising organisations’ cyber security posture. With the library of apps set up, cybersecurity professionals save time, reduce frustrations, and keep their security framework strong without extra effort as users install new apps. Any pre-approved application comes with optional temporary elevation. New allowlisting and ringfencing policies are automatically created, according to the pre-set policies to support an agile and streamlined zero trust environment with no security compromises.
ThreatLocker Web Control
Web access control is a must-have for cyber security, but it often means adding another third-party tool to your stack. That also means more vetting, integration headaches, and potential security gaps. With the new ThreatLocker Web Control, these risks and extra work are elimated.
In addition, ThreatLocker’s browser extension improves the user experience, letting them easily request permission to blocked sites. ThreatLocker does all the heavy lifting. It builds and dynamically update the library of website categories and apply the same controls to unmanaged devices accessing a company’s network all the while delivering a greater end-user experience.
ThreatLocker Cloud Control
ThreatLocker Cloud Control was developed as a powerful tool to protect companies’ Microsoft 365 tenant against phishing attacks and token thefts. It leverages built-in intelligence to assess whether a connection from a protected device originates from a trusted network. By analysing connection patterns from protected computers and mobile devices, it automatically identifies and allows trusted connections.
The result? Only users from IP addresses and networks deemed trusted by ThreatLocker can get in, automatically blocking phishing and token theft attacks. So, no matter how successful cybercriminals are with their phishing attacks and token thefts, all their efforts are useless now. No match. No entry.
ThreatLocker Detect Dashboard
The ThreatLocker Detect Dashboard compiles your environment’s incident and alerts data into easy-to-digest bar charts, line graphs, and pie charts. Its intuitive layout ensures quick insights with tooltips for deeper analysis and swift action. These insights include information about responses taken and the reason behind each.
As part of the incident response process, the Cyber Hero team provides policy recommendations, including which ones to enable or disable, along with detailed recommendations on how to respond to each incident. Each recommendation for an incident response can be resolved with one single click.
“Cybersecurity pros are always battling new threats, researching, vetting apps, and securing systems, while keeping operations uninterrupted,” said ThreatLocker Chief Product Officer Rob Allen. “Our latest innovations help teams make quicker decisions, gain deeper insights, save time with automation, and, hopefully, reduce stress while excelling at what they do.”