undefined

Rob Allen

Chief Product Officer at ThreatLocker, a cybersecurity company specializing in endpoint security.

Top 3 podcasts with Rob Allen

Ranked by the Snipd community
undefined
Jan 3, 2025 • 47min

Endpoint Security - Rob Allen - SWN Vault

Rob Allen, Chief Product Officer at ThreatLocker, dives into the world of endpoint security with humor and insight. He shares nostalgic tales about outdated operating systems like OS2 and NT 4.0, illustrating the challenges they've posed over the years. The discussion shifts to critical vulnerabilities, including poor password management and insider threats. With the surge of IoT devices, Rob emphasizes the necessity of a zero trust security model for safeguarding networks. Prepare for a blend of tech wisdom and laughs as they reflect on what security means today!
undefined
Dec 18, 2024 • 56min

NAC is Back - How Network Access Control Can Protect Your Remote Devices and Data - Rob Allen - BSW #376

Rob Allen, Chief Product Officer at ThreatLocker, dives into how Network Access Control (NAC) is essential for safeguarding remote devices in today's borderless work environment. He discusses the vulnerabilities presented by a lack of corporate firewalls and the significance of direct connections over traditional VPNs. The conversation also touches on the evolving role of CISOs and their heightened accountability amid rising cyber threats, underscoring the need for proactive, endpoint-centric security measures in the age of hybrid work.
undefined
Nov 18, 2024 • 32min

A Conversation with Rob Allen from ThreatLocker

Rob Allen, Chief Product Officer at ThreatLocker and an expert in endpoint protection, dives into the company's zero-trust approach to cybersecurity. He explains their unique 'deny by default' methodology that simplifies allowlisting and boosts security. Rob discusses innovative features like ring-fencing to prevent unauthorized access and the advanced Cloud Detect for monitoring platforms like Office 365. He also shares insights on managing software updates during critical periods and the importance of proactive threat detection.