Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
ThreatLocker Logo Award Winner Product Badge
ThreatLocker Logo Award Winner Product Badge
ThreatLocker

ThreatLocker

9.2 /10
Category
ThreatLocker
9.2 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatLocker won the following awards in the Endpoint Protection - Midmarket category

Filter By

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatLocker.

96 Likeliness to Recommend

100 Plan to Renew

86 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

+97 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

2% Negative
0% Neutral
98% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Trustworthy
  • Unique Features

Feature Ratings

Average 87

Vendor Capability Ratings

Average 87

ThreatLocker Screenshots

ThreatLocker Downloads

ThreatLocker Videos

ThreatLocker Reviews

  • Role: C-Level
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Aug 2023

Few products can protect on its own like TL

Likeliness to Recommend

9 /10

Pros

  • Reliable
  • Unique Features
  • Appreciates Incumbent Status
  • Security Protects

Sanket V.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Aug 2023

best for security setup

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

ThreatLocker distinguishes itself from other similar products by offering a unique zero-trust endpoint security approach that combines application whitelisting, application control, and ring fencing

What is your favorite aspect of this product?

its ability to provide granular control over application and device access, enhancing security while allowing for flexibility in managing endpoints.

What do you dislike most about this product?

ThreatLocker can be complex and may require a learning curve, which could be a potential drawback for those seeking a more straightforward solution.

What recommendations would you give to someone considering this product?

I recommend thoroughly assessing your organization's security needs, investing in training, and conducting a pilot test

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Enables Productivity

David W.

  • Role: C-Level
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Aug 2023

Great product! Takes some time to set up properly

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

Ringfencing is the main difference.

What is your favorite aspect of this product?

The peace of mind we have once all devices are in secure mode.

What do you dislike most about this product?

Having to create custom policies, but that has gotten much easier.

What recommendations would you give to someone considering this product?

Just do it!

Pros

  • Continually Improving Product
  • Trustworthy
  • Unique Features
  • Efficient Service

Most Popular ThreatLocker Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019