Average Ratings 0 Ratings
Average Ratings 681 Ratings
Description
With Learning Locker, Learning is easy! Learning is everywhere. Learning Locker allows organizations to combine experience data from multiple systems into one, providing a seamless source for analysis that makes learning measurable. Multi-tenant support is available in Learning Locker. This allows you to create multiple stores within Learning Locker to collect different types of xAPI based on your data source and storage requirements. Learning Locker offers a complete API that allows you to store and reuse valuable user information. This can be used to cut and dice xAPI data into ad hoc groups and report. Complex business rules can be used to transform incoming activity data in new, aggregated activity records. This is a great way to automate administrative and learning tasks. The Enterprise version comes fully managed and includes hosting as well as support. Enterprise SaaS customers have access to the most comprehensive features (apps), including Business Intelligence connectors and business rules.
Description
ThreatLocker Zero Trust Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
API Access
Has API
API Access
Has API
Integrations
Acorn LMS
Auth0
Azure-AD-External-Identities
ConnectWise ScreenConnect
Datto SaaS Protection
Eurekos
Google Forms
HaloPSA
IT Glue
Microsoft Power BI
Integrations
Acorn LMS
Auth0
Azure-AD-External-Identities
ConnectWise ScreenConnect
Datto SaaS Protection
Eurekos
Google Forms
HaloPSA
IT Glue
Microsoft Power BI
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Learning Pool
Founded
2006
Country
United States
Website
www.learningpool.com
Vendor Details
Company Name
ThreatLocker
Founded
2017
Country
United States
Website
www.threatlocker.com
Product Features
Business Intelligence
Ad Hoc Reports
Benchmarking
Budgeting & Forecasting
Dashboard
Data Analysis
Key Performance Indicators
Natural Language Generation (NLG)
Performance Metrics
Predictive Analytics
Profitability Analysis
Strategic Planning
Trend / Problem Indicators
Visual Analytics
Data Management
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
Learning Experience Platforms
Built-in Course Authoring
Content Sharing
Employee Portal
Gamification
Microlearning
Mobile Learning
Multi-User Collaboration
Recommendations
Reporting/Analytics
Self-Service Content Curation
Social Learning
Third Party Course Library
Learning Management Systems (LMS)
Academic / Education
Asynchronous Learning
Blended Learning
Built-In Course Authoring
Corporate / Business
Customizable
Gamification
Learner Portal
Mobile Learning
Open Source
SCORM Compliance
Synchronous Learning
Video Conferencing
eCommerce
eLearning Companies
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Firewall
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Access Control (NAC)
Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring