Invenio-IT

ThreatLocker Ringfencing Pricing

ThreatLocker-Ringfencing-Pricing
ThreatLocker-Ringfencing-Pricing
rating-threaten

Ringfencing™ Empowers you to take control

Protect yourself from cyberattacks by implementing limitations on application capabilities, whether it’s their ability to interact with other apps, access your files, control your data, or connect to the internet.

The many reasons organizations trust ThreatLocker for cybersecurity.

user-reviews-award
top-award
fastest-growing-award
top-100-award
category-leader-award
user-most-like-award
user-reviews-award
top-award
fastest-growing-award
top-100-award
category-leader-award
user-most-like-award
high-performer-award
leader-small-business
momentum-leader-award
globle-infosec-award
best-meets-requirements-award
best-support-award
high-performer-award
leader-small-business
momentum-leader-award
globle-infosec-award
best-meets-requirements-award
best-support-award

Introducing Ringfencing™

You’re in the driver’s seat, determining what applications can and cannot do once they’re up and running. By setting limitations on software capabilities, ThreatLocker significantly reduces the chances of successful exploits or the misuse of powerful tools like PowerShell by malicious actors.

 

With Ringfencing™, you have the power to dictate how applications interact with one another. For instance, while both Microsoft Word and PowerShell may have permissions, Ringfencing™ will prevent Microsoft Word from accessing PowerShell, effectively thwarting any attempts to exploit vulnerabilities like the notorious Follina vulnerability.

ringfencing-green

Why Choose Ringfencing™?

In today’s digital landscape, it’s vital to protect your sensitive data from cyber threats. That’s where Ringfencing™ comes in. By implementing this innovative solution, you can ensure that only authorized applications have access to your valuable information.

 

In traditional setups, any compromised application can potentially lead to data theft or encryption. But with Ringfencing™, you can create a secure environment where attackers are kept at bay. Even fileless malware, which operates in the computer’s memory and evades traditional detection methods, won’t stand a chance against our comprehensive protection.

How Does Ringfencing™ work?

When you implement Ringfencing™, your device will automatically be synchronized with the default ThreatLocker policies. These policies are then seamlessly applied to a comprehensive range of well-known applications such as: Microsoft Office, PowerShell, or Zoom. The primary purpose of these default policies is to establish a fundamental level of protection for all endpoints. Moreover, each of these policies can be effortlessly customized to suit any environment at any given time. Of course, our dedicated Cyber Hero Team is available round the clock, 365 days a year, to provide you with unwavering support.

ringfencing-how-work

Ringfencing™ Product Features:

rign-malware

Prevent Fileless Malware

Implement stringent application control measures to end fileless malware attacks.

rign-search

Enhance Application Security

Prevent applications from communicating with other applications, network resources, registry keys, files, and beyond with our granular application policies.

rign-cloud

Safeguard Against Application Attacks

Defend against application hopping and other application-based attacks by tightly controlling the access privileges of your applications.

rign-folder

Control Access to Your Valuable Files

Handpick the applications in your environment that are granted access to your important files, ensuring maximum security and confidentiality.

6 months Payback on Investment.
2M+ Endpoints Protected.
$1.6M in Saved Data Breach Costs.

ThreatLocker solutions stop threats at organizations like yours.

ThreatLocker + Ringfencing™ in Action:

Mitigating A Zero-Day Vulnerability & Solar Winds Attack

Situation: SolarWinds Orion was targeted in a supply chain attack by threat actors outside the nation. The attack exploited SolarWinds’ Orion software updates, which were installed by over 250 customers, including Fortune 500 businesses.

Outcome: ThreatLocker mitigated the SolarWinds Orion attack by blocking the application’s access to the internet. The code in the software attempted to reach an A-to-B server in the United States. By using the Ringfencing™ solution, the attack was successfully blocked from interacting with the internet, preventing it from downloading malware.

solarwinds
solarwinds

Protecting Against Zero-Day Vulnerabilities and the Microsoft Exchange Server Attack

Situation: The Microsoft Exchange Server on-premises editions were attacked using zero-day exploits discovered by Microsoft in 2021, giving cybercriminals ongoing administrative access to victims’ servers.

Outcome: ThreatLocker mitigated the attack by using its Ringfencing™ solution to limit IIS and block/limit access to applications, the internet, and user files, preventing the execution of remote web shells and minimizing post-exploitation damage.

Safeguarding Against Data Breach and the 3CX DesktopApp

Situation: The notorious UNC4736 hacker group, known for their affiliations with North Korea, successfully infiltrated the esteemed financial software firm, Trading Technologies. Employing their deceptive tactics, the hackers slyly implanted a hidden access point, commonly referred to as a backdoor, within the X_Trader application on Trading Technology’s website. This nefarious version of X_Trader was cleverly downloaded and installed on the computer of a vigilant 3CX employee, allowing the hackers to stealthily traverse through the intricate network of 3CX. Eventually, their cunning efforts led them to infiltrate the company’s sacred server, which is exclusively utilized for software development purposes. Dishearteningly, the hackers managed to corrupt the very essence of 3CX’s installer application available for download from their official website. Adding insult to injury, the corrupted 3CX installer was subtly disseminated through a legitimate software update, thus tricking unsuspecting users into falling prey to their devious scheme. Once the unsuspecting victims innocently executed the malicious 3CX installer, a treacherous malware, cleverly named ICONICSTEALER, cunningly infiltrated their systems by masquerading as several DLLs.

Outcome: ThreatLocker only allows approved applications and DLLs to run. It blocked malicious DLLs that were not on the allowlist for 3CX. Additionally, ThreatLocker used Ringfencing to limit the 3CX application’s access and prevent it from reaching out and downloading the ICONICSTEALER malware.

solarwinds
quote-down
quote-down

I think what ThreatLocker does, besides the kind of one-two punch of Allowlisting and Ringfencing™ is give us a view into something that none of us had before.

Tim R. CISO, JetBlue

We strongly believe ThreatLocker improves our cybersecurity posture. This is achieved at a significantly less cost than the layered approach associated with the legacy model of detect and respond, which requires multiple new tools to even attempt to meet current security challenges.

Doug L. CEO, TruTechnology

ThreatLocker is our last line of defense for protecting from today's ever evolving threats. The application and data control management interface are intuitive and allows us to easily manage thousands of endpoints.

Tom G. Managing Partner, Financial Sector

Our Clients love working with us.

Here’s what they have to say.

Invenio IT: Exceptional Support and Professionalism

I am very pleased with the support offered by Invenio IT. The professionalism and speedy response to all of my questions and issues have been handled impeccably. I would highly recommend their services.

William Porche

IT Network Manager

@Aurobindo Pharma

Six Years of Excellence with Invenio IT

Quick response and great customer relationship. We have been working with Invenio for over six years and it has been good results all around. Keep up the good work.

Date Kouy

Information Technology Manager

@Lowell Community Health Center

Reliable Six-Year Technology Partnership with Invenio IT

Invenio IT continues to provide our organization with excellent technology service and has done so, without fail, for the past six years. More, they will prove to be a reliable and responsive technology servicer for the life of your business.

Jason Blair

Network Systems Administrator

@Pediatric Home Service

Exceptional Long-Term Partnership

Invenio IT has been an exceptional business & technology partner for our company for many years. They have the best-in-class service (sales & support) and a knowledgeable teams on-staff when we need them the most. Good service; great people.

Larry Lou

SVP, Chief Technology Officer

@Leader Bank, NA

Dependable Vendor: Invenio IT's Top-Tier Support

Invenio IT has been very supportive and a long time vendor. They have supported our backup and recovery needs as well as provide top tier technical service whenever needed. Highly recommend!

Kevin Schnupp

Information Technology Manager

@Ronald McDonald House

Impeccable Support: Invenio IT Highly Recommended

I am very pleased with the support offered by Invenio IT. The professionalism and speedy response to all of my questions and issues have been handled impeccably. I would highly recommend their services.

William Porche

IT Network Manager

@Aurobindo Pharma

Six Years of Outstanding Service

Quick response and great customer relationship. We have been working with Invenio for over six years and it has been good results all around. Keep up the good work.

Date Kouy

Information Technology Manager

@Lowell Community Health Center

Exceptional Service from Invenio IT and Dale

We have been working with Invenio IT for over 3 years now. They have provided superior customer service and are very responsive. We work directly with Dale who is a pleasure to work with.

Anosh Zaveri

VP Information Technology

@Leader Bank, NA

Top-Notch IT Services: Invenio IT's Exceptional Support and Data Security

I highly recommend Invenio IT to everyone. They provide amazing customer service. They are very responsive, and quick to resolve any issues or concerns. They have been a tremendous resource for several IT projects. One product / service in particular that is an absolute must is their backup services using the Datto SIRIS. This is just one example of many that has simplified my life while giving me much improved data security. I have full confidence and peace of mind knowing my data is secure and always available. By far the absolute best IT company I have ever dealt with.

Robert Bearry

IT Director

@STEARNS SUPPLY CENTER

Leading the Way: Invenio IT's Exceptional IT Consulting and Managed Services

Invenio IT is a great organization to work with. Their consulting and managed services are exceptional are always at the leading edge of I.T. Strategy and execution, anticipating what you need before you experience an expensive order of magnitude "issue". They lead with integrity and clear down to earth communications. Highly recommended.

Leander Gillard

Global Project Lead

@RPMGlobal

Reliable Disaster Recovery Support: Invenio IT and Dale at the Helm

Invenio IT is the backbone for my disaster recovery solution. If I have anything wrong with my backups I am getting a call from Dale. This type of support is awesome especially when backing up 100+ servers.

Paul Gugel

Information Technology Manager

@Marlette Regional Hospital

Responsive and Supportive: Invenio IT, A Great Business Partner

Always responsive and helpful with a great team and awesome support, glad to do business with them.

Damien Russell

Senior Systems Administrator

@Easton, Redding & Region 9 Public School Districts

Superior Service with Invenio IT and Dale

We have been working with Invenio IT for over 3 years now. They have provided superior customer service and are very responsive. We work directly with Dale who is a pleasure to work with.

Anosh Zaveri

VP Information Technology

@Leader Bank, NA

Unmatched IT Excellence: Invenio IT's Stellar Customer Service and Data Security

I highly recommend Invenio IT to everyone. They provide amazing customer service. They are very responsive, and quick to resolve any issues or concerns. They have been a tremendous resource for several IT projects. One product / service in particular that is an absolute must is their backup services using the Datto SIRIS. This is just one example of many that has simplified my life while giving me much improved data security. I have full confidence and peace of mind knowing my data is secure and always available. By far the absolute best IT company I have ever dealt with.

Robert Bearry

IT Director

@STEARNS SUPPLY CENTER

Frequently Asked Questions

ThreatLocker RingfencingTM is a Zero Trust solution that gives complete control over how applications interact with applications, files, data, and the internet.

ThreatLocker Zero Trust Endpoint Protection Platform is a unified approach to protecting users, devices, and networks against the exploitation of zero-day vulnerabilities.

Absolutely! ThreatLocker offers 30-day trials, which comes with around-the-clock support and learning mode to provide seamless onboarding.

ThreatLocker support is available 24/7/365 via chat or Zoom. Chats are answered within 60 seconds and we offer a comprehensive knowledge base and ThreatLocker University for self-paced learning and Cyber Hero Certification.

ThreatLocker RingfencingTM pricing is both straightforward and scalable. With our pay-per-seat pricing model, you have the freedom to pay for only what you truly need, without any extra burden of unnecessary costs or features that you don’t require.

You may also like