Application Control Users Have Shared Their Experience With Us

Updated April 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE Application Control report based on 75+ real user experiences with these popular products:

...and 3 more!

Where should we email your report?






ThreatLocker Protect review

Roy Richardson
Roy Richardson
Founder, Vice President, Chief Security Officer at Aurora InfoTech
Integration is simple, deployment is straightforward, and extensive well-written...
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer...
Check Point Application Control review

LuisNeves
LuisNeves
Network System Administrator at Camara Municipal de Lisboa
Useful VPN, high performance, and beneficial report monitoring
There are many aspects we do not like about the solution and there are a lot of alternatives available on the market. Some of the settings are buried deep within the solution making it a challenge to navigate. It would be helpful if it was more intuitive. Additionally, there can be some settings that are in multiple places, this leaves the...

Since 2012, we've had 768,578 professionals use our research.

As seen in