This content is currently locked.

Your current McLean & Company subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
+1-877-281-0480 (US/CAN) or
+1-703-544-9513 (International)
ThreatLocker Logo Award Winner Product Badge
ThreatLocker Logo Award Winner Product Badge
ThreatLocker, Inc.

ThreatLocker

Composite Score
9.1 /10
CX Score
9.3 /10
Category
ThreatLocker
9.1 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatLocker won the following awards in the Endpoint Protection - Enterprise category

Filter By

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatLocker.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

94 Likeliness to Recommend

1
Since last award

99 Plan to Renew

1
Since last award

83 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

1% Negative
1% Neutral
98% Positive

Pros

  • Trustworthy
  • Fair
  • Acts with Integrity
  • Continually Improving Product

Feature Ratings

Average 86

Centralized Management Portal

92

System Hardening

92

Application Containment Mechanisms

90

Port and Device Control

88

Flexible Deployment Options

87

Kernel Monitoring

87

Host NGFW Functionality

87

Forensics

87

Dynamic Malware Detection

83

Cross Platform Integration

80

Cross Platform Support

79

Vendor Capability Ratings

Average 84

Vendor Support

90

Availability and Quality of Training

87

Business Value Created

86

Product Strategy and Rate of Improvement

86

Quality of Features

85

Breadth of Features

85

Ease of Data Integration

82

Ease of Implementation

82

Ease of Customization

80

Usability and Intuitiveness

80

Ease of IT Administration

78

ThreatLocker Screenshots

ThreatLocker Downloads

ThreatLocker Videos

ThreatLocker Reviews

David S.

  • Role: Information Technology
  • Industry: Finance
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Apr 2024

Fast, Efficient, Scalable, Innovative, Trustworthy

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

We performed a proof of concept with several products. None of which matched the: - Simplicity of processing requests - Ease in which applications can be reviewed - Speed in which policies are updated and deployed - Scalability for a small team to support so many endpoints

What is your favorite aspect of this product?

The way in which something so complex such as app control, can be made so much easier with this product.

What do you dislike most about this product?

That when I deal with other vendor support teams, I don't get the same level of service that I do from the ThreatLocker team.

What recommendations would you give to someone considering this product?

Understand your environment and plan your deployment. From our first initial PoC we tore down the structure and started again as it didn't quite fit all of our use cases and situations. We have since found the structure that best suits our need's, and it has been working well for over 12 months since. Application Control takes time, and if you don't have a mature change control process the deployment will be a lot harder.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Role: Information Technology
  • Industry: Consulting
  • Involvement: IT Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Mar 2024

Excellent Customer Service

Likeliness to Recommend

9 /10

Pros

  • Trustworthy
  • Respectful
  • Fair
  • Acts with Integrity

Larkin M.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Mar 2024

Fantastic product, but can be bothersome

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

ThreatLocker has a great policy for restricting everything that is not already allowed. If it has not been approved, there is no chance it will run. This will make you feel better about some user's behaviors on devices.

What is your favorite aspect of this product?

The best part of this product is that it makes me feel better as a systems administrator because I know nothing will run unless we allow it to run. This product will also allow you to elevate application permissions to run without requiring a local admin account.

What do you dislike most about this product?

If you have users that are tech savvy and are used to being able to install tools/apps, then it may get a bit cumbersome at times. The product works very well, but will cause issues for people making constant changes to their systems.

What recommendations would you give to someone considering this product?

If you are looking for something that WILL protect your endpoints, this is the one for you. Nothing will run unless you allow it. Just be careful when setting up policies to ensure coverage without leaving holes.

Pros

  • Continually Improving Product
  • Reliable
  • Trustworthy
  • Effective Service

Cons

  • Less Performance Enhancing
  • Less Productive

Most Popular ThreatLocker Comparisons