Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
ThreatLocker Logo Award Winner Product Badge
ThreatLocker Logo Award Winner Product Badge
ThreatLocker

ThreatLocker

Composite Score
9.2 /10
CX Score
9.4 /10
Category
ThreatLocker
9.2 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatLocker won the following awards in the Endpoint Protection - Midmarket category

Filter By

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatLocker.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

96 Likeliness to Recommend

100 Plan to Renew

86 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+97 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

1% Negative
0% Neutral
99% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Trustworthy
  • Unique Features

Feature Ratings

Average 87

Vendor Capability Ratings

Average 87

ThreatLocker Screenshots

ThreatLocker Downloads

ThreatLocker Videos

ThreatLocker Reviews

Jessica I.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Aug 2023

Bit of a learning curve, but great after!

Likeliness to Recommend

9 /10

What differentiates ThreatLocker from other similar products?

The easy user interface

What is your favorite aspect of this product?

How customizable policies are

What do you dislike most about this product?

While i can see if a policy has been changed from the unified audit, I can't see how it was changed

What recommendations would you give to someone considering this product?

Be patient with the learning curve. Once you learned it, it becomes super easy to navigate

Pros

  • Respectful
  • Helps Innovate
  • Continually Improving Product
  • Reliable

Mgcini M.

  • Role: Information Technology
  • Industry: Finance
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Aug 2023

Powerful tool enhancing security - Pro Toolkit!

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

ThreatLocker stands out from other similar products due to its distinctive application whitelisting approach. Instead of relying on traditional blacklisting, ThreatLocker focuses on permitting only approved applications to run, preventing unapproved software execution. This granular control provides robust protection against day-one threats, malware, and ransomware. Additionally, ThreatLocker's policy-driven management and seamless integration with existing security tools make it a comprehensive and user-friendly solution for organisations seeking a strong and effective security posture.

What is your favorite aspect of this product?

One of the notable aspects of ThreatLocker is its application whitelisting approach, which sets it apart from other security products. This method offers enhanced protection by allowing only approved applications to run, reducing the risk of unauthorised software execution and potential security breaches.

What do you dislike most about this product?

Depending on an organisation's existing IT infrastructure and applications, implementing and fine-tuning the whitelisting policies might require some effort and time. It's always essential for users to thoroughly evaluate the product to determine if it aligns with their specific needs and requirements, which I'm positive you will find it does.

What recommendations would you give to someone considering this product?

Assess needs and align with product capabilities. Pilot in a controlled environment first. Involve your IT staff and end-users for feedback. Plan implementation and provide training. Fine-tune whitelisting policies for balance. Regularly monitor and analyse logs for threats. Stay updated with features and best practices. Evaluate support and integration with existing tools. Compare with alternatives for the best fit - *important* Remember, security is an ongoing process; combine layers and best practices for a robust security posture.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Role: C-Level
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Aug 2023

Fantastic solution!

Likeliness to Recommend

10 /10

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular ThreatLocker Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019