Home » ThreatLocker Solutions » ThreatLocker Ringfencing Pricing
ThreatLocker Ringfencing™ Pricing Starts at $49
ThreatLocker Ringfencing™ protects you from cyberattacks by implementing limitations on application capabilities, such as their ability to interact with other apps, access your files, control your data, or connect to the internet.
ThreatLocker pricing is scalable and pay-per-seat pricing, so you only pay for what you need. It’s a flexible pricing model that works for businesses of any size.
The many reasons organizations trust ThreatLocker for cybersecurity.
Introducing Ringfencing™
You’re in the driver’s seat, determining what applications can and cannot do once they’re up and running. By setting limitations on software capabilities, ThreatLocker Ringfencing™ significantly reduces the chances of successful exploits or the misuse of powerful tools like PowerShell by malicious actors.
With Ringfencing™, you have the power to dictate how applications interact with one another. For instance, while both Microsoft Word and PowerShell may have permissions, Ringfencing™ will prevent Microsoft Word from accessing PowerShell, effectively thwarting any attempts to exploit vulnerabilities like the notorious Follina vulnerability.
Why Choose Ringfencing™?
In today’s digital landscape, it’s vital to protect your sensitive data from cyber threats. That’s where Ringfencing™ comes in. By implementing this innovative solution, you can ensure that only authorized applications have access to your valuable information.
In traditional setups, any compromised application can potentially lead to data theft or encryption. But with Ringfencing™, you can create a secure environment where attackers are kept at bay. Even fileless malware, which operates in the computer’s memory and evades traditional detection methods, won’t stand a chance against Ringfencing’s comprehensive protection.
How Does Ringfencing™ Work?
When you implement Ringfencing™, your device will automatically be synchronized with the default ThreatLocker policies. These policies are then seamlessly applied to a comprehensive range of well-known applications such as: Microsoft Office, PowerShell, or Zoom. The primary purpose of these default policies is to establish a fundamental level of protection for all endpoints. Moreover, each of these policies can be effortlessly customized to suit any environment at any given time. Plus, dedicated cybersecurity experts are available round the clock, 365 days a year, to provide you with unwavering support.
Ringfencing™ Product Features:
Prevent Fileless Malware
Implement stringent application control measures to end fileless malware attacks.
Enhance Application Security
Prevent applications from communicating with other applications, network resources, registry keys, files, and beyond with our granular application policies.
Safeguard Against Application Attacks
Defend against application hopping and other application-based attacks by tightly controlling the access privileges of your applications.
Control Access to Your Valuable Files
Handpick the applications in your environment that are granted access to your important files, ensuring maximum security and confidentiality.
Threatlocker Pricing Guide & Cost Factors
The price of ThreatLocker Ringfencing™ starts at just $49 per month, but costs will vary based on the needs of your organization and factors such as the number of endpoints or devices, the level of protection required and the need for add-on services.
What to know about Ringfencing™ pricing
- Flexibility: ThreatLocker offers a flexible pricing model tailored to the needs of all businesses—small, medium and enterprise.
- Subscription options: Clients can choose from either subscription-based plans or pay-per-endpoint pricing, depending on what works best for the organization.
- Pricing tiers: Subscription plans often include tiered pricing options, allowing businesses to scale their protection as their needs grow.
- Customization: Custom pricing packages may be available for enterprise clients or organizations with unique requirements.
- Discounts: Discounts for long-term agreements and bulk purchases are available.
6 months Payback on Investment.
2M+ Endpoints Protected.
$1.6M in Saved Data Breach Costs.
ThreatLocker solutions stop threats at organizations like yours.
ThreatLocker + Ringfencing™ in Action:
Mitigating A Zero-Day Vulnerability & Solar Winds Attack
Situation: SolarWinds Orion was targeted in a supply chain attack by threat actors outside the nation. The attack exploited SolarWinds’ Orion software updates, which were installed by over 250 customers, including Fortune 500 businesses.
Outcome: ThreatLocker mitigated the SolarWinds Orion attack by blocking the application’s access to the internet. The code in the software attempted to reach an A-to-B server in the United States. By using the Ringfencing™ solution, the attack was successfully blocked from interacting with the internet, preventing it from downloading malware.
Protecting Against Zero-Day Vulnerabilities and the Microsoft Exchange Server Attack
Situation: The Microsoft Exchange Server on-premises editions were attacked using zero-day exploits discovered by Microsoft in 2021, giving cybercriminals ongoing administrative access to victims’ servers.
Outcome: ThreatLocker mitigated the attack by using its Ringfencing™ solution to limit IIS and block/limit access to applications, the internet, and user files, preventing the execution of remote web shells and minimizing post-exploitation damage.
Safeguarding Against Data Breach and the 3CX DesktopApp
Situation: The notorious UNC4736 hacker group, known for their affiliations with North Korea, successfully infiltrated the esteemed financial software firm, Trading Technologies. Employing their deceptive tactics, the hackers slyly implanted a hidden access point, commonly referred to as a backdoor, within the X_Trader application on Trading Technology’s website. This nefarious version of X_Trader was cleverly downloaded and installed on the computer of a vigilant 3CX employee, allowing the hackers to stealthily traverse through the intricate network of 3CX. Eventually, their cunning efforts led them to infiltrate the company’s sacred server, which is exclusively utilized for software development purposes. Dishearteningly, the hackers managed to corrupt the very essence of 3CX’s installer application available for download from their official website. Adding insult to injury, the corrupted 3CX installer was subtly disseminated through a legitimate software update, thus tricking unsuspecting users into falling prey to their devious scheme. Once the unsuspecting victims innocently executed the malicious 3CX installer, a treacherous malware, cleverly named ICONICSTEALER, cunningly infiltrated their systems by masquerading as several DLLs.
Outcome: ThreatLocker only allows approved applications and DLLs to run. It blocked malicious DLLs that were not on the allowlist for 3CX. Additionally, ThreatLocker used Ringfencing to limit the 3CX application’s access and prevent it from reaching out and downloading the ICONICSTEALER malware.
Ringfencing™ Pricing vs. Competing Solutions
ThreatLocker Ringfencing starts at just $49 per user, making it more affordable than comparable zero-trust application security solutions from other providers, while also offering more robust protection.
| Ringfencing | Other Application Security Solutions |
Pricing | $49/user | $$$$ |
Monthly billing option | ✅ | ❌ |
Volume discounts | ✅ | ❌ |
Discounts for extended contracts | ✅ | ❌ |
No hidden fees | ✅ | ❌ |
Our Clients love working with us.
Here’s what they have to say.
Invenio IT: Exceptional Support and Professionalism
I am very pleased with the support offered by Invenio IT. The professionalism and speedy response to all of my questions and issues have been handled impeccably. I would highly recommend their services.
William Porche
IT Network Manager
@Aurobindo Pharma
Six Years of Excellence with Invenio IT
Quick response and great customer relationship. We have been working with Invenio for over six years and it has been good results all around. Keep up the good work.
Date Kouy
Information Technology Manager
@Lowell Community Health Center
Reliable Six-Year Technology Partnership with Invenio IT
Invenio IT continues to provide our organization with excellent technology service and has done so, without fail, for the past six years. More, they will prove to be a reliable and responsive technology servicer for the life of your business.
Jason Blair
Network Systems Administrator
@Pediatric Home Service
Exceptional Long-Term Partnership
Invenio IT has been an exceptional business & technology partner for our company for many years. They have the best-in-class service (sales & support) and a knowledgeable teams on-staff when we need them the most. Good service; great people.
Larry Lou
SVP, Chief Technology Officer
@Leader Bank, NA
Dependable Vendor: Invenio IT's Top-Tier Support
Invenio IT has been very supportive and a long time vendor. They have supported our backup and recovery needs as well as provide top tier technical service whenever needed. Highly recommend!
Kevin Schnupp
Information Technology Manager
@Ronald McDonald House
Impeccable Support: Invenio IT Highly Recommended
I am very pleased with the support offered by Invenio IT. The professionalism and speedy response to all of my questions and issues have been handled impeccably. I would highly recommend their services.
William Porche
IT Network Manager
@Aurobindo Pharma
Six Years of Outstanding Service
Quick response and great customer relationship. We have been working with Invenio for over six years and it has been good results all around. Keep up the good work.
Date Kouy
Information Technology Manager
@Lowell Community Health Center
Exceptional Service from Invenio IT and Dale
We have been working with Invenio IT for over 3 years now. They have provided superior customer service and are very responsive. We work directly with Dale who is a pleasure to work with.
Anosh Zaveri
VP Information Technology
@Leader Bank, NA
Top-Notch IT Services: Invenio IT's Exceptional Support and Data Security
I highly recommend Invenio IT to everyone. They provide amazing customer service. They are very responsive, and quick to resolve any issues or concerns. They have been a tremendous resource for several IT projects. One product / service in particular that is an absolute must is their backup services using the Datto SIRIS. This is just one example of many that has simplified my life while giving me much improved data security. I have full confidence and peace of mind knowing my data is secure and always available. By far the absolute best IT company I have ever dealt with.
Robert Bearry
IT Director
@STEARNS SUPPLY CENTER
Leading the Way: Invenio IT's Exceptional IT Consulting and Managed Services
Invenio IT is a great organization to work with. Their consulting and managed services are exceptional are always at the leading edge of I.T. Strategy and execution, anticipating what you need before you experience an expensive order of magnitude "issue". They lead with integrity and clear down to earth communications. Highly recommended.
Leander Gillard
Global Project Lead
@RPMGlobal
Reliable Disaster Recovery Support: Invenio IT and Dale at the Helm
Invenio IT is the backbone for my disaster recovery solution. If I have anything wrong with my backups I am getting a call from Dale. This type of support is awesome especially when backing up 100+ servers.
Paul Gugel
Information Technology Manager
@Marlette Regional Hospital
Responsive and Supportive: Invenio IT, A Great Business Partner
Always responsive and helpful with a great team and awesome support, glad to do business with them.
Damien Russell
Senior Systems Administrator
@Easton, Redding & Region 9 Public School Districts
Superior Service with Invenio IT and Dale
We have been working with Invenio IT for over 3 years now. They have provided superior customer service and are very responsive. We work directly with Dale who is a pleasure to work with.
Anosh Zaveri
VP Information Technology
@Leader Bank, NA
Unmatched IT Excellence: Invenio IT's Stellar Customer Service and Data Security
I highly recommend Invenio IT to everyone. They provide amazing customer service. They are very responsive, and quick to resolve any issues or concerns. They have been a tremendous resource for several IT projects. One product / service in particular that is an absolute must is their backup services using the Datto SIRIS. This is just one example of many that has simplified my life while giving me much improved data security. I have full confidence and peace of mind knowing my data is secure and always available. By far the absolute best IT company I have ever dealt with.
Robert Bearry
IT Director
@STEARNS SUPPLY CENTER
Frequently Asked Questions
Ringfencing™ is a zero-trust application security solution from ThreatLocker that helps to control what an approved application is allowed to do. It creates a digital fence around the application, restricting its access to only necessary files, network resources, and other applications, thereby preventing it from being exploited.
The price of ThreatLocker varies based on the security product, as well as the number of endpoints being protected, the number of users, the level of protection required and other factors. However, most ThreatLocker products offer options for subscription-based plans or pay-per-endpoint pricing, depending on what works best for the organization.
ThreatLocker Ringfencing pricing starts at $49 per month, per seat. Volume discounts and tiered pricing may be available for organizations based on their infrastructure and security needs.
In ThreatLocker, the term “ringfenced” refers to an application being protected by a policy-based “fence” that limits its ability to access other files, networks or applications, preventing it from being exploited by malware or malicious actors.