ThreatLocker Logo Award Winner Product Badge
ThreatLocker Logo Award Winner Product Badge
ThreatLocker, Inc.

ThreatLocker

Composite Score
9.1 /10
CX Score
9.3 /10
ThreatLocker
9.1 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatLocker won the following awards in the Endpoint Protection - Enterprise category

Filter By

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatLocker.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

94 Likeliness to Recommend

1
Since last award

99 Plan to Renew

1
Since last award

82 Satisfaction of Cost Relative to Value

2
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

1% Negative
1% Neutral
98% Positive

Pros

  • Continually Improving Product
  • Trustworthy
  • Fair
  • Acts with Integrity

Feature Ratings

Average 86

Centralized Management Portal

92

System Hardening

92

Application Containment Mechanisms

90

Port and Device Control

88

Flexible Deployment Options

87

Kernel Monitoring

87

Host NGFW Functionality

87

Forensics

87

Dynamic Malware Detection

83

Cross Platform Integration

80

Cross Platform Support

79

Vendor Capability Ratings

Average 84

Vendor Support

90

Availability and Quality of Training

88

Business Value Created

87

Product Strategy and Rate of Improvement

87

Quality of Features

86

Breadth of Features

85

Ease of Implementation

83

Ease of Data Integration

83

Usability and Intuitiveness

81

Ease of Customization

80

Ease of IT Administration

78

ThreatLocker Reviews

Mgcini M.

  • Role: Information Technology
  • Industry: Finance
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Aug 2023

Powerful tool enhancing security - Pro Toolkit!

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

ThreatLocker stands out from other similar products due to its distinctive application whitelisting approach. Instead of relying on traditional blacklisting, ThreatLocker focuses on permitting only approved applications to run, preventing unapproved software execution. This granular control provides robust protection against day-one threats, malware, and ransomware. Additionally, ThreatLocker's policy-driven management and seamless integration with existing security tools make it a comprehensive and user-friendly solution for organisations seeking a strong and effective security posture.

What is your favorite aspect of this product?

One of the notable aspects of ThreatLocker is its application whitelisting approach, which sets it apart from other security products. This method offers enhanced protection by allowing only approved applications to run, reducing the risk of unauthorised software execution and potential security breaches.

What do you dislike most about this product?

Depending on an organisation's existing IT infrastructure and applications, implementing and fine-tuning the whitelisting policies might require some effort and time. It's always essential for users to thoroughly evaluate the product to determine if it aligns with their specific needs and requirements, which I'm positive you will find it does.

What recommendations would you give to someone considering this product?

Assess needs and align with product capabilities. Pilot in a controlled environment first. Involve your IT staff and end-users for feedback. Plan implementation and provide training. Fine-tune whitelisting policies for balance. Regularly monitor and analyse logs for threats. Stay updated with features and best practices. Evaluate support and integration with existing tools. Compare with alternatives for the best fit - *important* Remember, security is an ongoing process; combine layers and best practices for a robust security posture.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Jul 2023

Likeliness to Recommend

10 /10

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Role: Information Technology
  • Industry: Insurance
  • Involvement: IT Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Jul 2023

Simple and effective endpoint management

Likeliness to Recommend

8 /10

Pros

  • Efficient Service
  • Effective Service
  • Caring
  • Saves Time

Most Popular ThreatLocker Comparisons