This site is part of the Informa Connect Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

The MSP Summit
Sept 28-30, 2026
Loews Royal PacificOrlando, FL
CPTV: ThreatLocker Uses Zero Trust to ‘Massively’ Reduce Attack Surface


In this CPTV interview, I spoke with ThreatLocker chief product officer Rob Allen about the vendor’s expansion from protecting end points into providing Zero-Trust network access and cloud access.

Fundamentally, we saw a number of problems that needed solving — and that's pretty much what we do. We find problems and we solve them,” Allen said. “We do a pretty good job at the end-point level, application control-wise, helping organizations be more secure. The problem is, the attack surface doesn't stop at the end point. A lot of attacks start at the end point, but they don't end there.”

To address these dangers, ThreatLocker launched in March new Zero Trust network access and cloud access solutions. ThreatLocker will show these products that expand its Zero Trust platform at Channel Partners Conference co-located with the MSP Summit next week in Las Vegas. Allen will speak in a session, Make Your Organization a Hard Target for Cybercriminals April 13.

We spoke about the security gaps those new products were designed to close.

“On the Zero Trust network access side — the default position for organizations that need to give remote access to resources has long been VPNs,” Allen said. “People have been under the impression that VPNs are secure, when in reality, a VPN port open to the internet is just one more port that's open. It’s increasing the attack surface.”

He said the ability to lock down cloud resources is just as important as securing local networks, sometimes even more important.

“Zero Trust cloud access massively reduces the attack surface,” Allen said. “Rather than having to allow the entire world to access your Office 365, your Salesforce, or whatever cloud system you use — instead of trying to lock it down by device or by user — it allows you to lock it down to just a couple of IP addresses. And if you can lock it down by IP address, it means that it doesn't matter if my credentials get grabbed or phished, or stolen or tokens are taken. It makes absolutely no difference. Only these couple of trusted IP addresses need to be able to connect to these cloud resources.”

Watch the full video above.

cybersecurity