Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
ThreatLocker Logo Award Winner Product Badge
ThreatLocker Logo Award Winner Product Badge
ThreatLocker

ThreatLocker

Composite Score
9.2 /10
CX Score
9.4 /10
Category
ThreatLocker
9.2 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatLocker won the following awards in the Endpoint Protection - Midmarket category

Filter By

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatLocker.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

96 Likeliness to Recommend

100 Plan to Renew

86 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+97 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

1% Negative
0% Neutral
99% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Trustworthy
  • Unique Features

Feature Ratings

Average 87

Vendor Capability Ratings

Average 87

ThreatLocker Screenshots

ThreatLocker Downloads

ThreatLocker Videos

ThreatLocker Reviews

Dawn S.

  • Role: C-Level
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Jul 2023

Easy way to deploy Zero Trust.

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

There really aren't similar products on the market yet. Many claim to have Zero Trust, but only have pieces in places. It's a great tool to keep zero trust lean in your organization.

What is your favorite aspect of this product?

Users can't install random software. Applications that could be malicious can't run.

What do you dislike most about this product?

Staff using it do need training. It's not an out of the box easy to use tool.

What recommendations would you give to someone considering this product?

If you are looking for a lean security stack, ThreatLocker will definitely help with that. Expect your staff to need training, and for full deployment to take a few months. If you do it right, you will be able to relax and know that your clients are better secured than your competition.

Pros

  • Continually Improving Product
  • Reliable
  • Trustworthy
  • Efficient Service

Ken J.

  • Role: C-Level
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jul 2023

Great solution for Essential 8 App Whitelisting

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

ThreatLocker offers a comprehensive approach to application control, allowing administrators to easily manage the approval and restriction of software across the network. Its intuitive dashboard empowers Admins to quickly create and update policies based on the organisation's specific needs. This level of flexibility ensures a fine-tuned security posture that adapts to dynamic IT environments. ThreatLocker is a cost-effective solution that efficiently meets the Essential 8 application whitelisting requirements.

What is your favorite aspect of this product?

One of the standout features of ThreatLocker is its ease of implementation. Even for organizations with limited IT resources and expertise, ThreatLocker provides a user-friendly interface that streamlines the entire setup process. The step-by-step configuration guides ensure that application whitelisting is up and running swiftly and efficiently, without the need for extensive training or specialized knowledge.

What do you dislike most about this product?

Nothing its awesome.

What recommendations would you give to someone considering this product?

ThreatLocker offers an exceptional cost-effective way to meet the Essential 8 application whitelisting requirements. With its straightforward implementation, comprehensive application control, efficient policy management, continuous monitoring, and affordability, ThreatLocker is a compelling choice for organizations of all sizes. Whether you are a small business or a large enterprise, ThreatLocker's ability to safeguard your network from unauthorized software and malicious applications makes it a commendable security solution in today's ever-evolving threat landscape.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Jul 2023

Great product!

Likeliness to Recommend

8 /10

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular ThreatLocker Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019