Learning LockerLearning Pool
|
||||||
About
Make Learning Measurable with Learning Locker. Learning happens everywhere. Learning Locker helps organizations to reconcile experience data from many systems into one, presenting a seamless source of analysis to make learning measurable. Learning Locker comes multi-tenant enabled, allowing you to set up multiple stores within Learning Locker to collect xAPI according to different data source and storage requirements. Learning Locker has a complete API for storing and reusing valuable user information that can be used to slice and dice xAPI data into ad-hoc groups and reporting. Create complex business rules to transform incoming activity data into new, aggregated activity records. Perfect for automating learning and administration tasks. Our Enterprise version is fully managed and includes hosting and support. Our most comprehensive features (apps) are only available to our Enterprise SaaS customers, including business rules and Business Intelligence connectors.
|
About
The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality.
The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprise organizations looking for an effective learning data management solution
|
Audience
IT pros looking for a Zero Trust Platform
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationLearning Pool
Founded: 2006
United States
www.learningpool.com
|
Company InformationThreatLocker
Founded: 2017
United States
www.threatlocker.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Data Management Features
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
Learning Experience Platforms Features
Built-in Course Authoring
Content Sharing
Employee Portal
Gamification
Microlearning
Mobile Learning
Multi-User Collaboration
Recommendations
Reporting/Analytics
Self-Service Content Curation
Social Learning
Third Party Course Library
Learning Management Systems (LMS) Features
Academic / Education
Asynchronous Learning
Blended Learning
Built-In Course Authoring
Corporate / Business
Customizable
eCommerce
eLearning Companies
Gamification
Learner Portal
Mobile Learning
Open Source
SCORM Compliance
Synchronous Learning
Video Conferencing
|
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Loss Prevention Features
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Firewall Features
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
Network Access Control (NAC) Features
Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access
Privileged Access Management Features
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
|
|||||
Integrations
Acorn LMS
Auth0
Azure-AD-External-Identities
ConnectWise ScreenConnect
Datto SaaS Protection
Eurekos
Google Forms
HaloPSA
IT Glue
Kaseya BMS
|
Integrations
Acorn LMS
Auth0
Azure-AD-External-Identities
ConnectWise ScreenConnect
Datto SaaS Protection
Eurekos
Google Forms
HaloPSA
IT Glue
Kaseya BMS
|
|||||
|
|