What is Zero Trust?

Zero Trust is a security framework that states that organisations should not trust any entity inside or outside their perimeter at any time. Organisations must provide the visibility and IT controls needed to secure, manage and monitor every device, user, app, and network used to access business data.

As part of an ongoing effort to ensure all systems are secure, we are now adding a zero-trust approach to your security stack. As attackers become more sophisticated, so do the complexities in stopping software-based threats.

Large governments and other enterprise organisations regularly adopt the techniques and solutions we are implementing. As your managed service provider, we understand that using a higher grade of security is fundamental in protecting you from the latest threats.

DNA IT, now with the power of ThreatLocker®

Vulnerable applications are the #1 cause of security breaches.  Attacks against web applications are now the fastest-growing category.

Working with ThreatLocker®, we can protect your applications from ransomware, and other malicious threats are one of our top security concerns.

ThreatLocker® combines Allowlisting with Ringfencing and Storage, Elevation, and Network Access controls in ways that make security simple. By combining these solutions, your applications will not be exploited. 


Using the ThreatLocker® solution, you can deny any application from running on your device that is not a part of the Allowlist. This helps to mitigate and stop cyberattacks from happening on your devices or across your network.

Firewall-like Application Policies

A powerful firewall-like policy engine that allows you to permit, deny or restrict application access at a granular level.

Time-Based Policies

Permit access to applications for a specified amount of time. Automatically block the application after the policy has expired.

Built-In Applications

ThreatLocker® automatically adds new hashes when application and system updates are released, allowing your applications to update without interference while preventing updates from being blocked.


Ringfencing™ controls what applications are able to do once they are running. By limiting what software can do, ThreatLocker® can reduce the likelihood of an exploit being successful or an attacker weaponiSing legitimate tools such as PowerShell.

Mitigate Against Fileless Malware

Stop fileless malware by limiting what applications are allowed to do.

Granular Application Policies

Stop applications from interacting with other applications, network resources, registry keys, files, and more.

Limit Application Attacks

Limit application attacks like application hopping by limiting what applications can access.

Limit to Your Files

The average computer has over 500 applications, and only a handful of those need to access your files. With Ringfencing™, you can choose which applications need to see which files.

Storage Control

Storage Control provides policy-driven control over storage devices, whether the storage device is a local folder, a network share, or external storage such as a USB drive. ThreatLocker® Storage Control allows granular policies to be set, which could be as simple as blocking USB drives, or as detailed as blocking access to your backup share, except when accessed by your backup application.

Audit Access to Files

A full detailed audit of all file access on USB, Network, and Local Hard Drives is centrally accessible within minutes of a file being opened.

Granular Storage Policies

Users can request permission to elevate applications and attach files and notes to support their requests.

Simple Requests for Access

A pop-up with the option to request access to the storage device.

Simple USB Blocking

USB Policies allow access based on device serial number, vendor, and/ or file type.

Elevation Control

Elevation Control puts IT administrators in the driving seat, enabling them to control exactly what applications can run as a local admin without giving users local admin rights.

When ThreatLocker® is first deployed, all existing applications are learned. Administrators can review the applications and select which can be run as a local administrator. Once enabled, a user can run the software as a local administrator without entering any credentials.

Complete Visibility of Administrative Rights

Gives you the ability to approve or deny an individual’s access to specific applications within an organisation even if the user is not a local administrator.

Streamlined Permission Requests

Users can request permission to elevate applications and attach files and notes to support their requests.

Varied Levels of Elevation

Enables you to set durations for how long users are allowed access to specific applications by granting either temporary or permanent access.

Secure Application Integration

Ringfencing™ ensures that once applications are elevated, users cannot jump to infiltrate connected applications within the network.

Network Access Control

ThreatLocker® Network Access Control is an endpoint and server firewall that enables you to have total control over network traffic, which ultimately helps you to protect your devices. Using custom-built policies, you can allow granular access based on IP address, specific keywords, or even agent authentication or dynamic ACLs.


Network Access Control gives users the ability to configure network access to endpoints using global and granular policies.


NAC enables users to deny all traffic to published servers while only allowing a single IP address dynamically or even a keyword. This is great for a user who is traveling often.


The cloud-managed solution provides customers with a centralised view of endpoint policies and network traffic across your organisation.

Enhanced Network Security

Ensure rogue devices on your network cannot access your servers or endpoints with Dynamic ACLs.