Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
ThreatLocker Logo
ThreatLocker Logo
ThreatLocker

ThreatLocker

Composite Score
9.1 /10
CX Score
9.3 /10
Category
ThreatLocker
9.1 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

95 Likeliness to Recommend

98 Plan to Renew

86 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

1% Negative
2% Neutral
97% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Trustworthy
  • Client Friendly Policies

Feature Ratings

Average 86

Vendor Capability Ratings

Average 86

ThreatLocker Screenshots

ThreatLocker Downloads

ThreatLocker Videos

ThreatLocker Reviews

Matt S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Apr 2024

Fantastic product with a lot of flexibility.

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

ThreatLocker has a great toolset with is critical for some of the business we do. They are also supported by a fantastic support staff who have never failed to help solve any issues or problems I have thrown at them.

What is your favorite aspect of this product?

Application Control

What do you dislike most about this product?

I can't say I have many complaints. Some documentation can be a little difficult to read and not as intuitive as I would like it to be.

What recommendations would you give to someone considering this product?

If you are looking for a tool to help support your business meet compliance and keep your company safe, this is the one for you.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Enables Productivity

David S.

  • Role: Information Technology
  • Industry: Finance
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Apr 2024

Fast, Efficient, Scalable, Innovative, Trustworthy

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

We performed a proof of concept with several products. None of which matched the: - Simplicity of processing requests - Ease in which applications can be reviewed - Speed in which policies are updated and deployed - Scalability for a small team to support so many endpoints

What is your favorite aspect of this product?

The way in which something so complex such as app control, can be made so much easier with this product.

What do you dislike most about this product?

That when I deal with other vendor support teams, I don't get the same level of service that I do from the ThreatLocker team.

What recommendations would you give to someone considering this product?

Understand your environment and plan your deployment. From our first initial PoC we tore down the structure and started again as it didn't quite fit all of our use cases and situations. We have since found the structure that best suits our need's, and it has been working well for over 12 months since. Application Control takes time, and if you don't have a mature change control process the deployment will be a lot harder.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Andrew S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Mar 2024

Simple, Affordable, Trustworthy

Likeliness to Recommend

8 /10

What differentiates ThreatLocker from other similar products?

I'd definitely say its frontline support. They are very quick to respond and happy to jump in a call to fix any issues that may be present. Thank you Cyber Heroes!

What is your favorite aspect of this product?

I like the 'Zero Trust' aspect of this product. Whitelisting specific applications and paths are very helpful. It is a great way to lockdown environments to prevent anything suspicious from occurring. If something is blocked and not listed, the user can simply request to use the application which can then be easily approved for future use.

What do you dislike most about this product?

If not set up correctly, it can be a pain having different users request multiple times for the same application.

What recommendations would you give to someone considering this product?

Make sure to setup policies correctly and strictly. Don't let ThreatLocker be overrun with unused polices and leave cluttered. This can possibly result in future security issues, but overall organization.

Pros

  • Continually Improving Product
  • Reliable
  • Unique Features
  • Effective Service

Most Popular ThreatLocker Comparisons

  • ThreatDown EDR Logo

    ThreatDown EDR

    Compare
  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • Sophos Intercept X Endpoint Logo

    Sophos Intercept X Endpoint

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • ESET Endpoint Security Logo

    ESET Endpoint Security

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019