Locking Down Microsoft Windows: ThreatLocker Acquires Third Wall

‘Microsoft Windows configuration security hardening is one of the biggest holes in the current MSP tool security stack,’ says US itek President & Founder David Stinner. ‘This is a big win for MSPs and a genius move by [ThreatLocker CEO] Danny Jenkins and ThreatLocker.’


MSP cybersecurity highflier ThreatLocker has acquired Third Wall, the maker of a powerful tool that locks down Microsoft Windows.

“This provides compliance and best practices so MSPs can harden the Windows operating system,” said ThreatLocker co-founder and CEO Danny Jenkins. “It hardens your Windows configuration to prevent breaches and provides MSPs with good Windows hygiene.”

Terms of the deal—the first-ever acquisition for ThreatLocker—were not disclosed. Third Wall makes an automated security plug-in for ConnectWise Automate that locks down Windows and provides security best practices and regulatory compliance settings for MSPs.

Sponsored post

ThreatLocker made the announcement before several thousand MSPs at MSP platform provider ConnectWise’s IT Nation Connect conference.

The deal effectively closes down one of the biggest security threats facing MSPs, said David Stinner, President & Founder of US itek, a Buffalo, N.Y.-based MSP and ThreatLocker partner.

“Microsoft Windows configuration security hardening is one of the biggest holes in the current MSP tool security stack,” said Stinner. “This is a big win for MSPs and a genius move by Danny Jenkins and ThreatLocker. Many MSPs don’t take the time to harden Windows because of the complexity and labor-intensive work involved in ensuring that Windows configurations are secure. This is huge because CMMC [Cybersecurity Maturity Model Configuration] as well as other security frameworks require Windows hardening.”

Putting Third Wall under the ThreatLocker umbrella will open the platform to many more MSPs, said Stinner. “Third Wall has been on my radar for years,” he said. “It’s a really cool company but when we looked at them we felt they were underfunded and could be a target for cybercriminals. Now that ThreatLocker has bought them we will definitely look at adding them to our security stack. This is awesome.”

The support and customer service that ThreatLocker provides MSPs makes Third Wall much more attractive to MSPs, said Stinner. “The support ThreatLocker provides MSPs is at a completely different level than what other MSP vendors provide us,” he said. “It’s great to see ThreatLocker stepping up and building out the platform. I am super excited that Third Wall is now going to be owned and operated by one of the best MSP vendors in the channel.”

The deal comes seven months after ThreatLocker received $100 million in Series C funding led by private equity powerhouse and growth equity investor General Atlantic.

Third Wall, which was founded in 2015, was named a CRN Emerging Vendor in 2020 with a 100 percent channel model.

ThreatLocker is integrating the Third Wall plug-in with its own MSP software platform, effectively providing a single pane of glass with best practices and regulatory complaince, said Jenkins.

ThreatLocker said the Third Wall plug-in provides automatic deployment of 58 policies aimed at stopping cybersecurity breaches. The Third Wall software ensures MSPs are compliant with HIPAA, PCI, NIST, GDPR and SOX.

“This allows MSPs to deliver more quality and centralized controls to their customers’ IT environments,” said Jenkins, who was named the No. 1 top IT innovator by CRN for its 2022 Top 100 Executive list. “MSPs are also saving money because they will no longer have to manage multiple platforms. Ultimately this provides more security for MSPs that is simpler to deploy and at less cost.”

ThreatLocker also intends to provide the Third Wall software plug-in for other remote management and monitoring platforms including Kaseya, Ninja, Atera and other platforms, said Jenkins.

“This adds to our goal of providing a central, sensible security solution for MSPs,” he said. “This is part of our commitment to MSPs to provide tangible controls that block malware without guesswork.”