Essential Security Package
"I need basic protection"
Provides foundational cybersecurity protection against common threats with automated patching and AI-powered malware detection. Automatically blocks known malware and suspicious behavior with self-managing security tools. Reduces basic IT security workload with continuous automated protection.
This tier provides automated protection that detects and responds to threats:
- Identifies malware (vs. preventing it from running)
- Patches vulnerabilities (vs. controlling what software can exploit them)
- Monitors behavior (vs. blocking unauthorized actions)
- Responds to attacks (vs. preventing them from starting)
Core Protection Features:
-
Remote Device Management (RMM-01) - Complete endpoint visibility, control, and asset inventory
RMM-01: Core Remote Monitoring and Management Platform
- Remote device management - Complete visibility and control over all endpoints
- Asset inventory - Complete tracking of hardware, software, and configurations
- System monitoring - Real-time visibility into device health and performance
- Software deployment - Centralized application and security update management
- Remote access - Immediate troubleshooting and support capabilities
- Configuration management - Standardized security settings enforcement
Prevents: Unmanaged device risks, configuration drift, shadow IT discovery -
Automated Patch Management (PATCH-01) - Systematic vulnerability closure across all endpoints
PATCH-01: Automated Vulnerability and Patch Management
- Automated patch deployment - Systematic closure of security vulnerabilities before exploitation
- Vulnerability scanning - Continuous identification of missing security updates
- Patch testing and rollback - Safe deployment with recovery capabilities
- Compliance reporting - Documentation of patch status for audit requirements
- Scheduled maintenance - Coordinated updates to minimize business disruption
Prevents: Vulnerability exploitation, zero-day attacks on known issues, compliance violations -
AI-Powered Endpoint Protection (EDR-01) - Advanced malware detection with behavioral analysis
EDR-01: AI-Powered Endpoint Detection and Response
- Storyline technology - Patented visual attack chain correlation that creates detailed stories of how threats unfold across your environment
- Dual AI protection engines - Advanced static AI and behavioral AI working together to detect known and unknown threats in real-time
- Patented 1-click rollback - Industry-unique ability to instantly restore Windows endpoints to pre-attack state, reversing ransomware encryption and malicious changes
- Autonomous on-device response - Machine-speed threat containment and remediation without requiring internet connectivity or cloud dependency
- Firewall control - Centralized network connectivity management with location-aware policies to control traffic to and from endpoints
- Device control - Complete USB and removable media management to prevent data theft and malware introduction
- Vulnerability management - Continuous scanning and reporting of third-party application vulnerabilities mapped to industry CVE database
- Application inventory - Real-time visibility into all software across your environment for security and compliance management
- Rogue network visibility - Automatic discovery of unmanaged devices on your network that lack security protection
- Full remote shell capabilities - Complete forensic investigation and hands-on remediation tools for security incidents
- Extended data retention - 365+ days of security event storage for compliance and forensic analysis
Prevents: Advanced malware, fileless attacks, living-off-the-land techniques, ransomware encryption, unknown zero-day exploits, network lateral movement, data exfiltration via removable media -
Automated Threat Response (RESP-01) - Immediate isolation and rollback capabilities
RESP-01: Automated Threat Response and Remediation
- Automated threat isolation - Immediate containment of infected devices to prevent spread
- Rollback capabilities - Automatically undoes malicious changes to restore systems
- Self-healing systems - Automatic recovery from malware damage without data loss
- Quarantine management - Controlled isolation while maintaining business continuity
Prevents: Malware spread, data corruption, system damage, extended downtime -
Cross-Platform Security (PLAT-01) - Unified protection for Windows, macOS, and Linux environments
PLAT-01: Cross-Platform Security Protection
- Unified security architecture - Consistent protection across Windows, macOS, and Linux environments
- Operating system optimization - Platform-specific security controls and monitoring
- Cross-platform threat correlation - Detection of attacks spanning multiple operating systems
- Centralized policy management - Unified security policies regardless of endpoint platform
Prevents: Platform-specific attacks, OS vulnerability exploitation, inconsistent security posture
Threat Coverage:
- Ransomware prevention and recovery
- Zero-day malware detection
- Vulnerability exploitation prevention
- Fileless and memory-based attacks
- Configuration drift protection
- Shadow IT discovery and control
Best For:
- Organizations establishing their first managed cybersecurity program
- Companies transitioning from basic antivirus to comprehensive endpoint protection
- Businesses requiring foundational security with automated threat response
Advanced Security Package
"I need expert help with sophisticated threats"
Prevents business email compromise and credential theft with 24/7 human experts monitoring your environment. Detects sophisticated attacks that bypass automated tools. Provides compliance documentation and audit trails to satisfy regulatory requirements.
This tier adds human experts who hunt threats and investigate incidents:
- Human analysts monitor (vs. automated alerts only)
- Investigates suspicious activity (vs. automated responses only)
- Tracks credential theft (vs. detecting malware only)
- Provides expert guidance (vs. self-service remediation)
Enhanced Features:
- Everything from Essential Package, plus:
-
24/7 Human Threat Hunting (SOC-01) - Expert analysts monitoring for sophisticated attacks
SOC-01: 24/7 Security Operations Center Monitoring
- Human threat hunters - Expert security analysts monitoring for sophisticated attacks around the clock
- Process insights - Advanced behavioral analysis monitoring application activity and detecting abuse of legitimate tools
- Ransomware canaries - Lightweight monitoring files providing early detection of ransomware encryption activities
- Forensic acquisition capabilities - Manual and automated forensic tasks initiated by SOC analysts during investigations
- Proactive threat hunting - Ad-hoc hunting efforts beyond standard delivery to identify undiscovered malware
- Managed antivirus - Advanced signature and heuristic-based protection with expert oversight
- Alert triage and escalation - Professional analysis of security events with less than 1% false positive rate
- Incident coordination - Expert guidance during active security incidents with 8-minute mean time to respond
Prevents: Sophisticated manual attacks, advanced persistent threats, undetected breaches, living-off-the-land attacks -
Persistent Threat Detection (PTD-01) - Identification of hidden malware surviving reboots
PTD-01: Persistent Threat Detection and Analysis
- Persistent foothold detection - Identifies hidden malware that survives system reboots
- Ransomware canaries - Early warning system for encryption activities before damage
- Deep forensic analysis - Investigation of complex attack chains and hidden threats
- Boot-time protection - Detection of threats that activate during system startup
Prevents: Hidden persistent malware, dormant threats, boot-level rootkits, stealth attacks -
Identity Threat Detection (ITDR-01) - Real-time monitoring of credential compromise and suspicious identity activities
ITDR-01: Identity Threat Detection and Response
- Rogue application detection - Industry-first proactive protection against malicious OAuth applications and unauthorized third-party access
- Unwanted access monitoring - Real-time detection of session hijacking, credential theft, VPN anomalies, and impossible travel scenarios
- Shadow workflow detection - Monitoring and detection of malicious inbox rules and email forwarding rules for business email compromise protection
- Credential compromise monitoring - Real-time detection of stolen or misused credentials with 3-minute mean time to respond
- Suspicious identity activity detection - Identification of abnormal login patterns, behaviors, and privilege changes
- Account takeover prevention - Protection against compromised user accounts with immediate isolation capabilities
- Privilege escalation detection - Monitoring for unauthorized elevation of user permissions and administrative access
Prevents: Credential theft, account compromise, privilege escalation, insider threats, business email compromise, OAuth application abuse -
Advanced Incident Response (IR-01) - Expert-led investigation and remediation guidance
IR-01: Expert-Led Incident Response
- Professional incident investigation - Expert-led analysis and remediation guidance
- Forensic analysis - Detailed examination of attack methods and impact assessment
- Remediation planning - Strategic guidance for threat containment and recovery
- Post-incident reporting - Comprehensive documentation for insurance and compliance
Prevents: Incomplete incident response, evidence destruction, recurring attacks -
Centralized Security Logging (SIEM-01) - Unified visibility and compliance reporting
SIEM-01: Security Information and Event Management
- Smart filtering technology - Proprietary filtering that eliminates noise and focuses only on relevant security data
- Centralized security logging - Unified collection and analysis of security events across 20+ integrated platforms
- Extended data retention - Log storage for up to 7 years to meet industry and region-specific compliance requirements
- Multi-source integration - Comprehensive visibility across firewalls, password managers, identity platforms, and VPN systems
- Predictable pricing model - Data source-based pricing with pooled allocation to avoid billing spikes and surprises
- Compliance reporting - Automated generation of audit trails and regulatory reports for PCI-DSS, CMMC, and other standards
- Advanced search capabilities - Intuitive query interface with rapid data rehydration for investigations
- Real-time alerting - Immediate notification of critical security events with expert SOC analysis
Prevents: Compliance violations, undetected attack patterns, audit failures, data storage cost surprises
Additional Threat Coverage:
- Sophisticated manual attacks that bypass automation
- Insider threat detection and behavioral monitoring
- Credential compromise and account takeover prevention
- Advanced persistent threats (APTs)
- Social engineering and manipulation attempts
- Complex attack chain detection
Best For:
- Microsoft 365 environments with remote or hybrid workforces
- Organizations targeted by business email compromise and credential theft attacks
- Companies requiring compliance documentation for audits, insurance, or client security questionnaires
Governance Security Package
"I need organizational control and governance"
Provides comprehensive security controls and detailed audit documentation that satisfy demanding security assessments and stakeholder requirements. Delivers centralized threat prevention, data protection, and policy management with the visibility and reporting needed for complex organizational governance.
This tier enforces strict software and device policies to prevent unauthorized activity:
- Blocks ALL unauthorized software (vs. detecting threats after they run)
- Controls network access (vs. monitoring network activity)
- Manages device connections (vs. detecting device-based attacks)
- Prevents execution (vs. responding to execution)
Premium Features:
- Everything from Advanced Package, plus:
-
Zero-Trust Application Control (APP-01) - Default-deny execution policy for all software
APP-01: Zero-Trust Application Control
- Default-deny execution policy - Blocks all software except explicitly authorized applications
- Application whitelisting - Granular control over what software can execute
- Script execution control - Management of PowerShell, batch files, and macro execution
- Software installation prevention - Stops unauthorized application installation
Prevents: Ransomware execution, malicious downloads, unauthorized software installation, script-based attacks -
Application Containment (APCON-01) - Prevention of legitimate tool weaponization
APCON-01: Application Behavior Containment
- Application containment - Prevents approved applications from being weaponized by attackers
- Behavioral boundaries - Controls what actions approved applications can perform
- Process isolation - Limits application access to system resources and other processes
- API call monitoring - Tracks and controls application programming interface usage
Prevents: Application weaponization, legitimate tool abuse, lateral movement through trusted apps -
Dynamic Allowlisting (ALLOW-01) - Automated adaptation to legitimate software updates
ALLOW-01: Dynamic Software Approval Management
- Automated allowlist updates - Adapts to legitimate software updates without manual intervention
- Software validation - Verification of application authenticity and integrity
- Version control - Management of approved software versions and updates
- Exception handling - Controlled approval process for new or updated applications
Prevents: Outdated allowlists, legitimate software blocking, update-related security gaps -
Privilege Management (PRIV-01) - Granular admin rights control with selective elevation
PRIV-01: Privilege and Elevation Control
- Admin rights removal - Eliminates unnecessary administrative privileges from user accounts
- Selective elevation - Allows specific applications to run with elevated permissions when needed
- Privilege monitoring - Tracks and logs all elevation requests and usage
- Just-in-time access - Temporary privilege elevation for specific tasks only
Prevents: Privilege abuse, unauthorized system changes, malware using admin rights -
Storage and Device Control (STOR-01) - USB, network share, and removable media management
STOR-01: Storage and Device Access Control
- USB device management - Controls access to removable storage devices
- Network share restrictions - Manages access to file servers and cloud storage
- Data loss prevention - Prevents unauthorized data transfer to external devices
- Device allowlisting - Controls which storage devices can be used
Prevents: Data exfiltration, malware introduction via USB, unauthorized data access -
Network Access Control (NETCON-01) - Zero-trust network access with dynamic endpoint firewall
NETCON-01: Network Access Control and Endpoint Firewall
- Dynamic endpoint firewall - Centrally managed firewall policies across all endpoints and servers
- Just-in-time port control - Ports automatically open for authorized devices and close when not needed
- Zero trust network access - Direct client-to-server connections without VPN overhead or complexity
- Dynamic ACLs - Automatic firewall adjustments based on location and IP without manual intervention
- Agent authentication - Network access restricted to ThreatLocker-protected devices only
- Global policy management - Unified firewall control across worldwide endpoints from single interface
Prevents: Rogue device network access, lateral movement through open ports, VPN vulnerabilities, manual firewall management -
Configuration Management (CONFMGR-01) - Centralized security policy and Windows configuration enforcement
CONFMGR-01: Centralized Configuration Management
- Windows configuration enforcement - Standardized security settings across endpoints, groups, or organizations
- Password policy management - Automated enforcement of length, complexity, and rotation requirements
- Local admin account control - Automatic renaming and password rotation for local administrator accounts
- Office security hardening - Disable macros, OLE objects, and other attack vectors in Microsoft Office
- System vulnerability mitigation - Disable autoplay, Universal Plug and Play, SMB v1, and other risky features
- Social media and productivity controls - Block or allow specific platforms based on business requirements
- Domain-independent operation - Functions without Active Directory domain requirements for remote/hybrid environments
Prevents: Configuration drift, weak password policies, Office-based macro attacks, vulnerable system services, compliance violations -
Executive Approval Workflows (APPR-01) - Managed authorization for security exceptions
APPR-01: Executive Approval Workflows
- Approval workflow automation - Streamlined process for security exception requests
- Executive oversight - Managed authorization for critical security decisions
- Change documentation - Complete audit trail of security policy modifications
- Risk assessment integration - Evaluation of security impact before approval
Prevents: Unauthorized security changes, undocumented exceptions, compliance violations
Ultimate Threat Coverage:
- Unauthorized software execution prevention
- Script-based attack blocking (PowerShell, macros, batch files)
- Application weaponization prevention
- Ransomware execution blocking by default
- Malicious download execution prevention
- Advanced evasion technique blocking
- Rogue device network access prevention
- Lateral movement through open ports blocking
- Configuration drift and policy violations prevention
- VPN vulnerabilities and complexity elimination
Best For:
- High-risk and regulated industries (healthcare, finance, manufacturing)
- Organizations handling sensitive customer data
- Companies requiring CMMC, HIPAA, or PCI DSS compliance
- Environments with sophisticated threat landscapes
- Executive and contractor device protection
Package Comparison Matrix
Security Capability | Essential | Advanced | Governance |
---|---|---|---|
AI-Powered Threat Prevention | ✓ | ✓ | ✓ |
Automated Vulnerability Management | ✓ | ✓ | ✓ |
Complete Asset Visibility & Control | ✓ | ✓ | ✓ |
Patented Rollback Technology | ✓ | ✓ | ✓ |
24/7 Human Threat Hunting | ✗ | ✓ | ✓ |
Identity & Credential Monitoring | ✗ | ✓ | ✓ |
Rogue Application Detection | ✗ | ✓ | ✓ |
Compliance Documentation & SIEM | ✗ | ✓ | ✓ |
Zero-Trust Application Control | ✗ | ✗ | ✓ |
Network Access Control | ✗ | ✗ | ✓ |
Device & Storage Policy Enforcement | ✗ | ✗ | ✓ |
Centralized Configuration Management | ✗ | ✗ | ✓ |
Response Approach | Automated Detection | Expert Investigation | Policy Prevention |
Mean Time to Response | Real-time | 8 minutes | 60 seconds |
Detailed Product Code References
Each package builds upon proven security technologies with specific product codes and capabilities. Below are the detailed specifications for key components across all security packages.
RMM-01: Core Remote Monitoring and Management Platform (Essential Package)
- Remote device management - Complete visibility and control over all endpoints
- Asset inventory - Complete tracking of hardware, software, and configurations
- System monitoring - Real-time visibility into device health and performance
- Software deployment - Centralized application and security update management
- Remote access - Immediate troubleshooting and support capabilities
- Configuration management - Standardized security settings enforcement
PATCH-01: Automated Vulnerability and Patch Management (Essential Package)
- Automated patch deployment - Systematic closure of security vulnerabilities before exploitation
- Vulnerability scanning - Continuous identification of missing security updates
- Patch testing and rollback - Safe deployment with recovery capabilities
- Compliance reporting - Documentation of patch status for audit requirements
- Scheduled maintenance - Coordinated updates to minimize business disruption
EDR-01: AI-Powered Endpoint Detection and Response (Essential Package)
- Storyline technology - Patented visual attack chain correlation that creates detailed stories of how threats unfold across your environment
- Dual AI protection engines - Advanced static AI and behavioral AI working together to detect known and unknown threats in real-time
- Patented 1-click rollback - Industry-unique ability to instantly restore Windows endpoints to pre-attack state, reversing ransomware encryption and malicious changes
- Autonomous on-device response - Machine-speed threat containment and remediation without requiring internet connectivity or cloud dependency
- Firewall control - Centralized network connectivity management with location-aware policies to control traffic to and from endpoints
- Device control - Complete USB and removable media management to prevent data theft and malware introduction
- Vulnerability management - Continuous scanning and reporting of third-party application vulnerabilities mapped to industry CVE database
- Application inventory - Real-time visibility into all software across your environment for security and compliance management
- Rogue network visibility - Automatic discovery of unmanaged devices on your network that lack security protection
- Full remote shell capabilities - Complete forensic investigation and hands-on remediation tools for security incidents
- Extended data retention - 365+ days of security event storage for compliance and forensic analysis
RESP-01: Automated Threat Response and Remediation (Essential Package)
- Automated threat isolation - Immediate containment of infected devices to prevent spread
- Rollback capabilities - Automatically undoes malicious changes to restore systems
- Self-healing systems - Automatic recovery from malware damage without data loss
- Quarantine management - Controlled isolation while maintaining business continuity
PLAT-01: Cross-Platform Security Protection (Essential Package)
- Unified security architecture - Consistent protection across Windows, macOS, and Linux environments
- Operating system optimization - Platform-specific security controls and monitoring
- Cross-platform threat correlation - Detection of attacks spanning multiple operating systems
- Centralized policy management - Unified security policies regardless of endpoint platform
SOC-01: 24/7 Security Operations Center Monitoring (Advanced+ Packages)
- Human threat hunters - Expert security analysts monitoring for sophisticated attacks around the clock
- Process insights - Advanced behavioral analysis monitoring application activity and detecting abuse of legitimate tools
- Ransomware canaries - Lightweight monitoring files providing early detection of ransomware encryption activities
- Forensic acquisition capabilities - Manual and automated forensic tasks initiated by SOC analysts during investigations
- Proactive threat hunting - Ad-hoc hunting efforts beyond standard delivery to identify undiscovered malware
- Managed antivirus - Advanced signature and heuristic-based protection with expert oversight
- Alert triage and escalation - Professional analysis of security events with less than 1% false positive rate
- Incident coordination - Expert guidance during active security incidents with 8-minute mean time to respond
PTD-01: Persistent Threat Detection and Analysis (Advanced+ Packages)
- Persistent foothold detection - Identifies hidden malware that survives system reboots
- Ransomware canaries - Early warning system for encryption activities before damage
- Deep forensic analysis - Investigation of complex attack chains and hidden threats
- Boot-time protection - Detection of threats that activate during system startup
ITDR-01: Identity Threat Detection and Response (Advanced+ Packages)
- Rogue application detection - Industry-first proactive protection against malicious OAuth applications and unauthorized third-party access
- Unwanted access monitoring - Real-time detection of session hijacking, credential theft, VPN anomalies, and impossible travel scenarios
- Shadow workflow detection - Monitoring and detection of malicious inbox rules and email forwarding rules for business email compromise protection
- Credential compromise monitoring - Real-time detection of stolen or misused credentials with 3-minute mean time to respond
- Suspicious identity activity detection - Identification of abnormal login patterns, behaviors, and privilege changes
- Account takeover prevention - Protection against compromised user accounts with immediate isolation capabilities
- Privilege escalation detection - Monitoring for unauthorized elevation of user permissions and administrative access
IR-01: Expert-Led Incident Response (Advanced+ Packages)
- Professional incident investigation - Expert-led analysis and remediation guidance
- Forensic analysis - Detailed examination of attack methods and impact assessment
- Remediation planning - Strategic guidance for threat containment and recovery
- Post-incident reporting - Comprehensive documentation for insurance and compliance
SIEM-01: Security Information and Event Management (Advanced+ Packages)
- Smart filtering technology - Proprietary filtering that eliminates noise and focuses only on relevant security data
- Centralized security logging - Unified collection and analysis of security events across 20+ integrated platforms
- Extended data retention - Log storage for up to 7 years to meet industry and region-specific compliance requirements
- Multi-source integration - Comprehensive visibility across firewalls, password managers, identity platforms, and VPN systems
- Predictable pricing model - Data source-based pricing with pooled allocation to avoid billing spikes and surprises
- Compliance reporting - Automated generation of audit trails and regulatory reports for PCI-DSS, CMMC, and other standards
- Advanced search capabilities - Intuitive query interface with rapid data rehydration for investigations
- Real-time alerting - Immediate notification of critical security events with expert SOC analysis
APP-01: Zero-Trust Application Control (Governance Package)
- Default-deny execution policy - Blocks all software except explicitly authorized applications
- Application whitelisting - Granular control over what software can execute
- Script execution control - Management of PowerShell, batch files, and macro execution
- Software installation prevention - Stops unauthorized application installation
APCON-01: Application Behavior Containment (Governance Package)
- Application containment - Prevents approved applications from being weaponized by attackers
- Behavioral boundaries - Controls what actions approved applications can perform
- Process isolation - Limits application access to system resources and other processes
- API call monitoring - Tracks and controls application programming interface usage
ALLOW-01: Dynamic Software Approval Management (Governance Package)
- Automated allowlist updates - Adapts to legitimate software updates without manual intervention
- Software validation - Verification of application authenticity and integrity
- Version control - Management of approved software versions and updates
- Exception handling - Controlled approval process for new or updated applications
PRIV-01: Privilege and Elevation Control (Governance Package)
- Admin rights removal - Eliminates unnecessary administrative privileges from user accounts
- Selective elevation - Allows specific applications to run with elevated permissions when needed
- Privilege monitoring - Tracks and logs all elevation requests and usage
- Just-in-time access - Temporary privilege elevation for specific tasks only
STOR-01: Storage and Device Access Control (Governance Package)
- USB device management - Controls access to removable storage devices
- Network share restrictions - Manages access to file servers and cloud storage
- Data loss prevention - Prevents unauthorized data transfer to external devices
- Device allowlisting - Controls which storage devices can be used
NETCON-01: Network Access Control and Endpoint Firewall (Governance Package)
- Dynamic endpoint firewall - Centrally managed firewall policies across all endpoints and servers
- Just-in-time port control - Ports automatically open for authorized devices and close when not needed
- Zero trust network access - Direct client-to-server connections without VPN overhead or complexity
- Dynamic ACLs - Automatic firewall adjustments based on location and IP without manual intervention
- Agent authentication - Network access restricted to ThreatLocker-protected devices only
- Global policy management - Unified firewall control across worldwide endpoints from single interface
CONFMGR-01: Centralized Configuration Management (Governance Package)
- Windows configuration enforcement - Standardized security settings across endpoints, groups, or organizations
- Password policy management - Automated enforcement of length, complexity, and rotation requirements
- Local admin account control - Automatic renaming and password rotation for local administrator accounts
- Office security hardening - Disable macros, OLE objects, and other attack vectors in Microsoft Office
- System vulnerability mitigation - Disable autoplay, Universal Plug and Play, SMB v1, and other risky features
- Social media and productivity controls - Block or allow specific platforms based on business requirements
- Domain-independent operation - Functions without Active Directory domain requirements for remote/hybrid environments
APPR-01: Executive Approval Workflows (Governance Package)
- Approval workflow automation - Streamlined process for security exception requests
- Executive oversight - Managed authorization for critical security decisions
- Change documentation - Complete audit trail of security policy modifications
- Risk assessment integration - Evaluation of security impact before approval
Upgrade Path & All Package Inclusions
Seamless Migration: Clients can seamlessly move between packages as their security needs evolve, with each tier building upon the previous foundation without requiring technology replacement.
All Packages Include:
- • Proactive threat prevention and detection
- • Automated response and containment
- • System rollback and recovery capabilities
- • Real-time monitoring and alerting
- • Regular security reporting and documentation
Ready to Secure Your Organization?
Let our security experts help you choose the right cybersecurity package for your specific needs and risk profile. Get started with a complimentary security assessment to understand your current vulnerabilities and recommended protection level.