Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
ThreatLocker Logo Award Winner Product Badge
ThreatLocker Logo Award Winner Product Badge
ThreatLocker

ThreatLocker

9.2 /10
Category
ThreatLocker
9.2 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatLocker won the following awards in the Endpoint Protection - Midmarket category

Filter By

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatLocker.

96 Likeliness to Recommend

100 Plan to Renew

86 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

+97 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

2% Negative
0% Neutral
98% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Trustworthy
  • Unique Features

Feature Ratings

Average 87

Vendor Capability Ratings

Average 87

ThreatLocker Screenshots

ThreatLocker Downloads

ThreatLocker Videos

ThreatLocker Reviews

Mgcini M.

  • Role: Information Technology
  • Industry: Finance
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Aug 2023

Powerful tool enhancing security - Pro Toolkit!

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

ThreatLocker stands out from other similar products due to its distinctive application whitelisting approach. Instead of relying on traditional blacklisting, ThreatLocker focuses on permitting only approved applications to run, preventing unapproved software execution. This granular control provides robust protection against day-one threats, malware, and ransomware. Additionally, ThreatLocker's policy-driven management and seamless integration with existing security tools make it a comprehensive and user-friendly solution for organisations seeking a strong and effective security posture.

What is your favorite aspect of this product?

One of the notable aspects of ThreatLocker is its application whitelisting approach, which sets it apart from other security products. This method offers enhanced protection by allowing only approved applications to run, reducing the risk of unauthorised software execution and potential security breaches.

What do you dislike most about this product?

Depending on an organisation's existing IT infrastructure and applications, implementing and fine-tuning the whitelisting policies might require some effort and time. It's always essential for users to thoroughly evaluate the product to determine if it aligns with their specific needs and requirements, which I'm positive you will find it does.

What recommendations would you give to someone considering this product?

Assess needs and align with product capabilities. Pilot in a controlled environment first. Involve your IT staff and end-users for feedback. Plan implementation and provide training. Fine-tune whitelisting policies for balance. Regularly monitor and analyse logs for threats. Stay updated with features and best practices. Evaluate support and integration with existing tools. Compare with alternatives for the best fit - *important* Remember, security is an ongoing process; combine layers and best practices for a robust security posture.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Role: C-Level
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Aug 2023

Fantastic solution!

Likeliness to Recommend

10 /10

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Benjamin S.

  • Role: Information Technology
  • Industry: Other
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jul 2023

Allows me to sleep at night!

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

As an MSP, Threatlocker allows us to customize the application whitelisting for different industries and use cases with ease. With other products we aren't able to easily implement the security controls that we need to keep our clients safe in the same way that Threatlocker allows us to do.

What is your favorite aspect of this product?

Threatlocker is a joy to work with. The customer service team is fantastic. We have regular reviews of our clients deployments with Colin and he is great. Threatlocker's company philosophy lines up with ours.

What do you dislike most about this product?

Sometimes the administration portal can be a bit finicky. However, they are updating the portal which should help things in the future. Requests from clients can be a bit tedious sometimes to allow. If you don't respond to a Threatlocker request quickly it can make a client unhappy if they are waiting for you to open an application or install an update.

What recommendations would you give to someone considering this product?

You need to make sure that you have a dedicated person who can respond to requests otherwise they may stay open for too long. Make your client aware that you are implementing these security controls, because if they are going from having local admin to being locked down in Threatlocker it can be a pain point. Make sure you have a machine in learning mode for an adequate amount of time, otherwise there could be applications that haven't been added to policy if they haven't been opened.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular ThreatLocker Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019