Third Wall™ for LabTech® – Operational Considerations to Enhance Endpoint Security

Dr. Kenneth Knapp, CEO, Cyber Secure Advising

CISSP, Certified Ethical Hacker

April 2016


Although most companies these days have good firewalls and strong antivirus, the area of cybersecurity at the endpoint has become the battlefield of choice for malware and hackers. End users are, innocently or not, clicking on unsafe links and opening dangerous attachments. Employees are stealing data. And even IT professionals are leaving open protocols and services that are vulnerable – and often not even being used. The concepts of “least privilege” and “least access” are becoming ever more critical – and Third Wall is helping to address that with a technology-assisted approach.

 Applying Least Privilege to Achieve Endpoint Security


This paper describes why a product like Third Wall™ for LabTech® is a critical element of an organization’s cybersecurity strategy. Third Wall significantly increases endpoint security in Windows-based environments by implementing the principle of least privilege. This strategy not only enhances endpoint security at the point of attack for malicious hackers today, but Third Wall also promotes good risk management and regulatory compliance. This paper outlines five key ways that Third Wall implements least privilege at the endpoint. It also provides a summary on how Third Wall can help with the compliance of specific standards.

Operational Considerations to Enhance Endpoint Security


This paper discusses several key vulnerabilities that are addressed by Third Wall™, and how you should view them in your environment. If possible, you should address these vulnerabilities, whether through Third Wall™ or through other means.  Implementing Third Wall™ Policies significantly strengthens Operational Cybersecurity across an organization.