Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
ThreatLocker Logo Award Winner Product Badge
ThreatLocker Logo Award Winner Product Badge
ThreatLocker

ThreatLocker

9.2 /10
Category
ThreatLocker
9.2 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatLocker won the following awards in the Endpoint Protection - Midmarket category

Filter By

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatLocker.

96 Likeliness to Recommend

100 Plan to Renew

86 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

+97 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

2% Negative
0% Neutral
98% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Trustworthy
  • Unique Features

Feature Ratings

Average 87

Vendor Capability Ratings

Average 87

ThreatLocker Screenshots

ThreatLocker Downloads

ThreatLocker Videos

ThreatLocker Reviews

michael c.

  • Role: Information Technology
  • Industry: Banking
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jul 2023

Easy to use and very effective

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

Never used any other products

What is your favorite aspect of this product?

Very over protective

What do you dislike most about this product?

Nothing at the moment

What recommendations would you give to someone considering this product?

Take as many meetings as you can with the company so they can show you the ins and outs

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Dawn S.

  • Role: C-Level
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Jul 2023

Easy way to deploy Zero Trust.

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

There really aren't similar products on the market yet. Many claim to have Zero Trust, but only have pieces in places. It's a great tool to keep zero trust lean in your organization.

What is your favorite aspect of this product?

Users can't install random software. Applications that could be malicious can't run.

What do you dislike most about this product?

Staff using it do need training. It's not an out of the box easy to use tool.

What recommendations would you give to someone considering this product?

If you are looking for a lean security stack, ThreatLocker will definitely help with that. Expect your staff to need training, and for full deployment to take a few months. If you do it right, you will be able to relax and know that your clients are better secured than your competition.

Pros

  • Continually Improving Product
  • Reliable
  • Trustworthy
  • Efficient Service

Ken J.

  • Role: C-Level
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jul 2023

Great solution for Essential 8 App Whitelisting

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

ThreatLocker offers a comprehensive approach to application control, allowing administrators to easily manage the approval and restriction of software across the network. Its intuitive dashboard empowers Admins to quickly create and update policies based on the organisation's specific needs. This level of flexibility ensures a fine-tuned security posture that adapts to dynamic IT environments. ThreatLocker is a cost-effective solution that efficiently meets the Essential 8 application whitelisting requirements.

What is your favorite aspect of this product?

One of the standout features of ThreatLocker is its ease of implementation. Even for organizations with limited IT resources and expertise, ThreatLocker provides a user-friendly interface that streamlines the entire setup process. The step-by-step configuration guides ensure that application whitelisting is up and running swiftly and efficiently, without the need for extensive training or specialized knowledge.

What do you dislike most about this product?

Nothing its awesome.

What recommendations would you give to someone considering this product?

ThreatLocker offers an exceptional cost-effective way to meet the Essential 8 application whitelisting requirements. With its straightforward implementation, comprehensive application control, efficient policy management, continuous monitoring, and affordability, ThreatLocker is a compelling choice for organizations of all sizes. Whether you are a small business or a large enterprise, ThreatLocker's ability to safeguard your network from unauthorized software and malicious applications makes it a commendable security solution in today's ever-evolving threat landscape.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular ThreatLocker Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019