Home » ThreatLocker Solutions » ThreatLocker Ringfencing Pricing


Ringfencing™ Pricing Starts at $49
Protect yourself from cyberattacks by implementing limitations on application capabilities, whether it’s their ability to interact with other apps, access your files, control your data, or connect to the internet.
And, with scalable, pay-per-seat pricing, you only pay for what you need—nothing more. ThreatLocker has a flexible pricing model that works for all size businesses.
The many reasons organizations trust ThreatLocker for cybersecurity.
Introducing Ringfencing™
You’re in the driver’s seat, determining what applications can and cannot do once they’re up and running. By setting limitations on software capabilities, ThreatLocker significantly reduces the chances of successful exploits or the misuse of powerful tools like PowerShell by malicious actors.
With Ringfencing™, you have the power to dictate how applications interact with one another. For instance, while both Microsoft Word and PowerShell may have permissions, Ringfencing™ will prevent Microsoft Word from accessing PowerShell, effectively thwarting any attempts to exploit vulnerabilities like the notorious Follina vulnerability.
Why Choose Ringfencing™?
In today’s digital landscape, it’s vital to protect your sensitive data from cyber threats. That’s where Ringfencing™ comes in. By implementing this innovative solution, you can ensure that only authorized applications have access to your valuable information.
In traditional setups, any compromised application can potentially lead to data theft or encryption. But with Ringfencing™, you can create a secure environment where attackers are kept at bay. Even fileless malware, which operates in the computer’s memory and evades traditional detection methods, won’t stand a chance against our comprehensive protection.
How Does Ringfencing™ work?
When you implement Ringfencing™, your device will automatically be synchronized with the default ThreatLocker policies. These policies are then seamlessly applied to a comprehensive range of well-known applications such as: Microsoft Office, PowerShell, or Zoom. The primary purpose of these default policies is to establish a fundamental level of protection for all endpoints. Moreover, each of these policies can be effortlessly customized to suit any environment at any given time. Of course, our dedicated Cyber Hero Team is available round the clock, 365 days a year, to provide you with unwavering support.
Ringfencing™ Product Features:
Prevent Fileless Malware
Implement stringent application control measures to end fileless malware attacks.
Enhance Application Security
Prevent applications from communicating with other applications, network resources, registry keys, files, and beyond with our granular application policies.
Safeguard Against Application Attacks
Defend against application hopping and other application-based attacks by tightly controlling the access privileges of your applications.
Control Access to Your Valuable Files
Handpick the applications in your environment that are granted access to your important files, ensuring maximum security and confidentiality.
6 months Payback on Investment.
2M+ Endpoints Protected.
$1.6M in Saved Data Breach Costs.
ThreatLocker solutions stop threats at organizations like yours.
ThreatLocker + Ringfencing™ in Action:
Mitigating A Zero-Day Vulnerability & Solar Winds Attack
Situation: SolarWinds Orion was targeted in a supply chain attack by threat actors outside the nation. The attack exploited SolarWinds’ Orion software updates, which were installed by over 250 customers, including Fortune 500 businesses.
Outcome: ThreatLocker mitigated the SolarWinds Orion attack by blocking the application’s access to the internet. The code in the software attempted to reach an A-to-B server in the United States. By using the Ringfencing™ solution, the attack was successfully blocked from interacting with the internet, preventing it from downloading malware.
Protecting Against Zero-Day Vulnerabilities and the Microsoft Exchange Server Attack
Situation: The Microsoft Exchange Server on-premises editions were attacked using zero-day exploits discovered by Microsoft in 2021, giving cybercriminals ongoing administrative access to victims’ servers.
Outcome: ThreatLocker mitigated the attack by using its Ringfencing™ solution to limit IIS and block/limit access to applications, the internet, and user files, preventing the execution of remote web shells and minimizing post-exploitation damage.
Safeguarding Against Data Breach and the 3CX DesktopApp
Situation: The notorious UNC4736 hacker group, known for their affiliations with North Korea, successfully infiltrated the esteemed financial software firm, Trading Technologies. Employing their deceptive tactics, the hackers slyly implanted a hidden access point, commonly referred to as a backdoor, within the X_Trader application on Trading Technology’s website. This nefarious version of X_Trader was cleverly downloaded and installed on the computer of a vigilant 3CX employee, allowing the hackers to stealthily traverse through the intricate network of 3CX. Eventually, their cunning efforts led them to infiltrate the company’s sacred server, which is exclusively utilized for software development purposes. Dishearteningly, the hackers managed to corrupt the very essence of 3CX’s installer application available for download from their official website. Adding insult to injury, the corrupted 3CX installer was subtly disseminated through a legitimate software update, thus tricking unsuspecting users into falling prey to their devious scheme. Once the unsuspecting victims innocently executed the malicious 3CX installer, a treacherous malware, cleverly named ICONICSTEALER, cunningly infiltrated their systems by masquerading as several DLLs.
Outcome: ThreatLocker only allows approved applications and DLLs to run. It blocked malicious DLLs that were not on the allowlist for 3CX. Additionally, ThreatLocker used Ringfencing to limit the 3CX application’s access and prevent it from reaching out and downloading the ICONICSTEALER malware.
Simple, Flexible ThreatLocker Pricing
ThreatLocker pricing starts at just $45 per month, but costs will vary based on the needs of your organization and factors such as number of endpoints or devices, the level of protection required and if you are looking for add-on services. Here are a few things to keep in mind when it comes to pricing:
- ThreatLocker offers a flexible pricing model tailored to the needs of all businesses—small, medium and enterprise!
- Clients can choose from either subscription-based plans or pay-per-endpoint pricing, depending on what works best for the organization.
- Subscription plans often include tiered pricing options, allowing businesses to scale their protection as their needs grow.
- Custom pricing packages may be available for enterprise clients or organizations with unique requirements.
- Discounts for long-term agreements and bulk purchases are available.
Our Clients love working with us.
Here’s what they have to say.
Invenio IT: Exceptional Support and Professionalism
I am very pleased with the support offered by Invenio IT. The professionalism and speedy response to all of my questions and issues have been handled impeccably. I would highly recommend their services.
William Porche
IT Network Manager
@Aurobindo Pharma
Six Years of Excellence with Invenio IT
Quick response and great customer relationship. We have been working with Invenio for over six years and it has been good results all around. Keep up the good work.
Date Kouy
Information Technology Manager
@Lowell Community Health Center
Reliable Six-Year Technology Partnership with Invenio IT
Invenio IT continues to provide our organization with excellent technology service and has done so, without fail, for the past six years. More, they will prove to be a reliable and responsive technology servicer for the life of your business.
Jason Blair
Network Systems Administrator
@Pediatric Home Service
Exceptional Long-Term Partnership
Invenio IT has been an exceptional business & technology partner for our company for many years. They have the best-in-class service (sales & support) and a knowledgeable teams on-staff when we need them the most. Good service; great people.
Larry Lou
SVP, Chief Technology Officer
@Leader Bank, NA
Dependable Vendor: Invenio IT's Top-Tier Support
Invenio IT has been very supportive and a long time vendor. They have supported our backup and recovery needs as well as provide top tier technical service whenever needed. Highly recommend!
Kevin Schnupp
Information Technology Manager
@Ronald McDonald House
Impeccable Support: Invenio IT Highly Recommended
I am very pleased with the support offered by Invenio IT. The professionalism and speedy response to all of my questions and issues have been handled impeccably. I would highly recommend their services.
William Porche
IT Network Manager
@Aurobindo Pharma
Six Years of Outstanding Service
Quick response and great customer relationship. We have been working with Invenio for over six years and it has been good results all around. Keep up the good work.
Date Kouy
Information Technology Manager
@Lowell Community Health Center
Exceptional Service from Invenio IT and Dale
We have been working with Invenio IT for over 3 years now. They have provided superior customer service and are very responsive. We work directly with Dale who is a pleasure to work with.
Anosh Zaveri
VP Information Technology
@Leader Bank, NA
Top-Notch IT Services: Invenio IT's Exceptional Support and Data Security
I highly recommend Invenio IT to everyone. They provide amazing customer service. They are very responsive, and quick to resolve any issues or concerns. They have been a tremendous resource for several IT projects. One product / service in particular that is an absolute must is their backup services using the Datto SIRIS. This is just one example of many that has simplified my life while giving me much improved data security. I have full confidence and peace of mind knowing my data is secure and always available. By far the absolute best IT company I have ever dealt with.
Robert Bearry
IT Director
@STEARNS SUPPLY CENTER
Leading the Way: Invenio IT's Exceptional IT Consulting and Managed Services
Invenio IT is a great organization to work with. Their consulting and managed services are exceptional are always at the leading edge of I.T. Strategy and execution, anticipating what you need before you experience an expensive order of magnitude "issue". They lead with integrity and clear down to earth communications. Highly recommended.
Leander Gillard
Global Project Lead
@RPMGlobal
Reliable Disaster Recovery Support: Invenio IT and Dale at the Helm
Invenio IT is the backbone for my disaster recovery solution. If I have anything wrong with my backups I am getting a call from Dale. This type of support is awesome especially when backing up 100+ servers.
Paul Gugel
Information Technology Manager
@Marlette Regional Hospital
Responsive and Supportive: Invenio IT, A Great Business Partner
Always responsive and helpful with a great team and awesome support, glad to do business with them.
Damien Russell
Senior Systems Administrator
@Easton, Redding & Region 9 Public School Districts
Superior Service with Invenio IT and Dale
We have been working with Invenio IT for over 3 years now. They have provided superior customer service and are very responsive. We work directly with Dale who is a pleasure to work with.
Anosh Zaveri
VP Information Technology
@Leader Bank, NA
Unmatched IT Excellence: Invenio IT's Stellar Customer Service and Data Security
I highly recommend Invenio IT to everyone. They provide amazing customer service. They are very responsive, and quick to resolve any issues or concerns. They have been a tremendous resource for several IT projects. One product / service in particular that is an absolute must is their backup services using the Datto SIRIS. This is just one example of many that has simplified my life while giving me much improved data security. I have full confidence and peace of mind knowing my data is secure and always available. By far the absolute best IT company I have ever dealt with.
Robert Bearry
IT Director
@STEARNS SUPPLY CENTER
Frequently Asked Questions
ThreatLocker RingfencingTM is a Zero Trust solution that gives complete control over how applications interact with applications, files, data, and the internet.
ThreatLocker Zero Trust Endpoint Protection Platform is a unified approach to protecting users, devices, and networks against the exploitation of zero-day vulnerabilities.
Absolutely! ThreatLocker offers 30-day trials, which comes with around-the-clock support and learning mode to provide seamless onboarding.
ThreatLocker support is available 24/7/365 via chat or Zoom. Chats are answered within 60 seconds and we offer a comprehensive knowledge base and ThreatLocker University for self-paced learning and Cyber Hero Certification.
ThreatLocker RingfencingTM pricing is both straightforward and scalable. With our pay-per-seat pricing model, you have the freedom to pay for only what you truly need, without any extra burden of unnecessary costs or features that you don’t require.