What is ThreatLocker?
ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceThreatLocker Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on ThreatLocker.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
96 Likeliness to Recommend
100 Plan to Renew
86 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+97 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love ThreatLocker?
Pros
- Helps Innovate
- Continually Improving Product
- Trustworthy
- Unique Features
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Vendor Capability Ratings
Also Featured in...
Application Control
Unified Audit
Approval Center
Industry Leading Support - Chat with a Cyber Hero
Are Your Employees Adding Security Holes? | ThreatLocker 60 Second TV Spot
ThreatLocker Success Story - Advanced Medical Transport
ThreatLocker Success Story - Stampede Meats
ThreatLocker Testimonial - Redner's Markets
ThreatLocker Success Story - Hattiesburg Clinic
ThreatLocker Success Story - Pioneer-360
Demo 2023: Deployment
Demo 2023: Allowlisting
Demo 2023: Ringfencing
Demo 2023: Elevation Control
Demo 2023: Storage Control
Demo 2023: Network Control (NAC)
ThreatLocker Reviews
Jessica I.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Aug 2023
Bit of a learning curve, but great after!
Likeliness to Recommend
What differentiates ThreatLocker from other similar products?
The easy user interface
What is your favorite aspect of this product?
How customizable policies are
What do you dislike most about this product?
While i can see if a policy has been changed from the unified audit, I can't see how it was changed
What recommendations would you give to someone considering this product?
Be patient with the learning curve. Once you learned it, it becomes super easy to navigate
Pros
- Respectful
- Helps Innovate
- Continually Improving Product
- Reliable
Please tell us why you think this review should be flagged.
Mgcini M.
- Role: Information Technology
- Industry: Finance
- Involvement: Business Leader or Manager
Submitted Aug 2023
Powerful tool enhancing security - Pro Toolkit!
Likeliness to Recommend
What differentiates ThreatLocker from other similar products?
ThreatLocker stands out from other similar products due to its distinctive application whitelisting approach. Instead of relying on traditional blacklisting, ThreatLocker focuses on permitting only approved applications to run, preventing unapproved software execution. This granular control provides robust protection against day-one threats, malware, and ransomware. Additionally, ThreatLocker's policy-driven management and seamless integration with existing security tools make it a comprehensive and user-friendly solution for organisations seeking a strong and effective security posture.
What is your favorite aspect of this product?
One of the notable aspects of ThreatLocker is its application whitelisting approach, which sets it apart from other security products. This method offers enhanced protection by allowing only approved applications to run, reducing the risk of unauthorised software execution and potential security breaches.
What do you dislike most about this product?
Depending on an organisation's existing IT infrastructure and applications, implementing and fine-tuning the whitelisting policies might require some effort and time. It's always essential for users to thoroughly evaluate the product to determine if it aligns with their specific needs and requirements, which I'm positive you will find it does.
What recommendations would you give to someone considering this product?
Assess needs and align with product capabilities. Pilot in a controlled environment first. Involve your IT staff and end-users for feedback. Plan implementation and provide training. Fine-tune whitelisting policies for balance. Regularly monitor and analyse logs for threats. Stay updated with features and best practices. Evaluate support and integration with existing tools. Compare with alternatives for the best fit - *important* Remember, security is an ongoing process; combine layers and best practices for a robust security posture.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Please tell us why you think this review should be flagged.
- Role: C-Level
- Industry: Technology
- Involvement: Business Leader or Manager
Submitted Aug 2023
Fantastic solution!
Likeliness to Recommend
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Please tell us why you think this review should be flagged.
Get Instant Access<br>to this Report
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.
© 2024 SoftwareReviews.com. All rights reserved.