CLICK THROUGH DEMOS DEMO 1 Leverage ZeroLock threat trees to quickly understand root causes DEMO 2 Using ZeroLocks lockdown rules to prevent attacks DEMO 3 ZeroLock Anti-Tamper and Agent Footprint DEMO 4 ZeroLock detects and stops ransomware launched via a Log4j vulnerability DEMO 5 ZeroLock SSH-MFA