Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Tuesday recap

NewsDealsSocialBlogsVideosPodcasts
HomeTechnologyCybersecurityNewsThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked
ThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked
CTO PulseCIO PulseCybersecurity

ThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked

•March 5, 2026
0
CRN (US)
CRN (US)•Mar 5, 2026

Why It Matters

For managed service providers, the added cloud and mobile controls close a critical breach gap, enabling secure, seamless access without performance penalties, and thus strengthening their value proposition in a market saturated with slow VPN‑based ZTNA tools.

Key Takeaways

  • •Deny‑by‑default extended to cloud and mobile devices
  • •New ZTNA avoids VPNs, exposing no open ports
  • •Device‑bound SaaS access nullifies stolen credentials
  • •Selective traffic brokering delivers near‑gigabit speeds
  • •MSPs gain seamless, secure app access across devices

Pulse Analysis

Zero‑trust architectures have moved from buzzword to baseline requirement as enterprises confront relentless phishing and credential‑theft attacks. ThreatLocker’s latest announcement pushes its deny‑by‑default philosophy beyond the endpoint, covering cloud workloads and mobile devices. By anchoring access decisions to both user identity and the specific device, the company tackles the most common breach vector—compromised credentials in SaaS platforms such as Office 365 and Salesforce. The rollout, unveiled at Zero Trust World 2026, follows the construction of 14 new data centers designed to keep latency low while scaling globally.

Unlike traditional ZTNA solutions that tunnel all traffic, ThreatLocker employs selective traffic brokering at the protocol level. This approach routes only the necessary application packets through the nearest data center, leaving voice and media streams local and preserving user experience. In internal testing the broker achieved roughly 950 Mbps on a gigabit link, nearly double the throughput of comparable WireGuard VPN deployments. By eliminating exposed internet ports and the need for VPN clients, the platform reduces attack surface while delivering performance that rivals native network connections, a critical advantage for MSP‑managed environments.

The extension of deny‑by‑default to cloud and mobile contexts gives managed service providers a powerful tool to protect clients without sacrificing productivity. With device‑bound authentication, stolen passwords become useless, dramatically lowering the success rate of phishing‑driven intrusions. ThreatLocker’s cautious stance on AI—using it only where it adds measurable value—also signals a pragmatic shift away from hype toward reliable, analytics‑driven security. As AI‑generated malware and geopolitically motivated attacks rise, solutions that combine strict access controls with high‑performance networking are likely to become a differentiator for MSPs competing in a crowded market.

ThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...