No more typing reviews! Try our Samantha, our new voice AI agent.

Appgate SDP vs ThreatLocker Zero Trust Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 17, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (7th), Secure Access Service Edge (SASE) (8th)
Appgate SDP
Average Rating
8.8
Reviews Sentiment
6.8
Number of Reviews
6
Ranking in other categories
ZTNA as a Service (19th), ZTNA (11th), Secure Access Service Edge (SASE) (20th), Microsegmentation Software (10th)
ThreatLocker Zero Trust Pla...
Average Rating
9.2
Reviews Sentiment
7.1
Number of Reviews
74
Ranking in other categories
Network Access Control (NAC) (4th), Endpoint Protection Platform (EPP) (6th), Advanced Threat Protection (ATP) (7th), Application Control (1st), ZTNA (4th), Ransomware Protection (1st)
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
IgnitiusMolepo - PeerSpot reviewer
Senior IP Network Defense at MTN
Helps us manage traffic-related issues and streamlines access management for the network
Appgate SDP has significantly streamlined our access management, providing a notably efficient solution compared to traditional VPNs. The simplicity of the SDP platform is a standout feature; instead of navigating through intricate details, users can seamlessly connect to the company's network or switch to the internet with minimal effort, unlike VPNs which often involve waiting for connection handling and unblocking. Recognizing the robustness of SDP, we made strategic decisions to minimize reliance on VPNs, reserving only two for administrative purposes. In a scenario where Appgate SDP significantly improved our network security posture, the platform played a crucial role in fortifying defenses against major threats. The encryption algorithms utilized by SDP provide a high level of security to our network architecture. Compared to Cisco, SDP proves to be most critical in protecting resources with the help of role-based policies. It only provides selective access to the application. The dynamic policy engine significantly enhances our access control mechanisms. It has single sign-on and multifactor authentication features. It makes processes faster and easier. It has helped our IT team to manage the workload with ease. It gives an intelligent solution whenever they face traffic-related problems. I rate it a nine out of ten.
Santo Joy - PeerSpot reviewer
Head Of Cyber Security at a outsourcing company with 201-500 employees
Security controls have been strengthened with granular application, ringfencing, and access policies
The features of ThreatLocker Zero Trust Endpoint Protection Platform that I like the most are the Ringfencing, elevation control, storage control, and application whitelisting functionality. For examples of how these features benefit my company, we were looking for a solution across various vendors to actually implement application whitelisting controls. ThreatLocker's agent, which is very lightweight and does not use much CPU or RAM, helped us achieve that solution. Ringfencing was an add-on that ticked off a lot of Australian framework security controls, which is the reason we chose it. My impression of the allowlisting feature in terms of managing which software, scripts, and libraries run on my devices is that ThreatLocker's community page has a lot of information around this, which is very helpful. Not only that, the Cyber Hero support that ThreatLocker provides gives us insights and best practices, helping us achieve that solution and guiding us to the right platform. The impact of Ringfencing on controlling the behavior of approved applications has been a big winner for us because it is something that many other platforms do not provide as a functionality. Having that allowed us to identify what applications talk to each other, which is something that many other platforms do not do. The network control feature impacts my ability to manage network traffic across my endpoints and servers. We have not used this widely across all our partners, but wherever required, we use it. It has been an easy solution for those customers to get that control implemented. The elevation feature's role in facilitating just-in-time administrative access for approved applications shows that elevation control helps in many use cases involving remote control platforms, door usage, and security system platforms that require local admins. There are many solutions that provide this functionality, but the licensing cost seems to be expensive, and it also adds another solution into the mix. Rather than doing that, we try to use ThreatLocker Zero Trust Endpoint Protection Platform to achieve that control. Regarding the storage control feature, I have used it. The primary function is USB blocking, which is very widely adopted, and also just locking down and allowing certain users to access certain file locations helps us there. When it comes to enforcing policy-driven access over various storage devices, it depends on the business risk adapted by the companies that we support, but generally the use case is USB and external storage devices where companies know that is a risk, but they do not have appropriate solutions. There are EDR platforms that claim to do this, but ThreatLocker Zero Trust Endpoint Protection Platform does it at an advanced level. My assessment of the efficiency of the real-time threat intelligence and category controls employed by Web Control in blocking malicious and non-compliant sites leads me to think that Web Control is another functionality within ThreatLocker Zero Trust Endpoint Protection Platform that is an add-on on top of the current set. That is another solution that we use based on what is required for the company, but again, that is not widely adapted yet for our partners.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its initial setup was straightforward."
"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"We chose iboss for both zero trust and proxy (SWG) because their SWG was superior."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"Content filtering is the most useful feature of iboss."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"Technical support is pretty sharp and very responsive."
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"The simplicity of the SDP platform is a standout feature; instead of navigating through intricate details, users can seamlessly connect to the company's network or switch to the internet with minimal effort."
"It is a scalable solution...The support answers your questions very fast."
"The interface is really friendly. It's simple to understand."
"Appgate SDP is the best solution for micro-segmentation and supplying VPN solutions."
"One of the most important features is stopping lateral movement across our network."
"It is pretty stable."
"The flexibility of the tool is valuable. It is very robust. It has a very robust configuration capability."
"The flexibility of the tool is valuable; it is very robust, has a very robust configuration capability, is pretty well documented, and is also good interface-wise."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"ThreatLocker Zero Trust Endpoint Protection Platform has absolutely saved us money, and I sleep better at night because of it, as we have the MDR package as well and just knowing someone is watching those endpoints at 3:00 a.m. is a lifesaver that you cannot put a dollar figure on."
"ThreatLocker stands out because they understand application whitelisting and elevation controls deeply, addressing real issues effectively."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"ThreatLocker Zero Trust Endpoint Protection Platform benefits my company by allowing us to be preventative instead of being retroactive or reactive."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"With ThreatLocker, we don't have shadow IT, and it has reduced ransomware."
"I would rate it a ten out of ten."
 

Cons

"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"If they could implement an extra security layer preventing access to iboss from the open internet, it would be great."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"It would be better to connect to an application portal from any device. Documentation and support could be better."
"The user interface should be improved as it is not very easy to work with the updates."
"One thing that kind of sticks out to me is the ability to do a proper non-split tunnel. VPN tunnel-wise, it is not really a true unsplit tunnel, but I think that's just because of the way it's designed. A split VPN basically allows your system to talk to other systems without being forced down the tunnel. A VPN running in a non-split tunnel mode forces all the traffic down the tunnel to wherever you're VPNing to. It forces the traffic down so that the traffic is subject to the firewall and rules that you have in your corporate environment and such. It helps to prevent remote malicious folks that may be talking directly to that box from piggybacking into the corporate environment through it. They do it partially, but it would be nice to see more of an enterprise-level solution there."
"One thing that kind of sticks out to me is the ability to do a proper non-split tunnel."
"They could provide a single-box solution to manage tools for 4000 users. Additionally, they could add extra features to enhance remote micro connection."
"On the cloud, when you make some changes, it may be difficult."
"One limitation is that it's harder to provide access to multiple applications in the company with Appgate, but that's probably because of poor management."
"On the cloud, when you make some changes, it may be difficult."
"We use other vendors for other components. I'd like one vendor to control all aspects of the business, including backup, EDR solutions, email monitoring, and control, rather than using multiple vendors."
"The allowlisting feature of ThreatLocker Zero Trust Endpoint Protection Platform is really good. It's very, very strict, so in some ways, it can be frustrating because you have to explicitly allow each individual thing."
"More visibility in the built-ins would be nice."
"There are some times when applications get submitted, the hashes don't really line up."
"ThreatLocker Zero Trust Endpoint Protection Platform could be improved by being able to consolidate even more with an EDR for deeper scanning as needed."
"At the time, ThreatLocker does not have a great way to do that; you have to make separate groups."
"I think ThreatLocker Zero Trust Endpoint Protection Platform can be improved with an identity and multi-factor authentication module so that it can help manage situations when you elevate a command prompt to run as an administrator by incorporating its own MFA into that process."
"ThreatLocker Zero Trust Endpoint Protection Platform can be improved by providing admin rights that allow us to manage it from the server by providing some token IDs or any kind of OTP if someone has rights and is on leave."
 

Pricing and Cost Advice

"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The overall pricing for iboss is very competitive and transparent."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The pricing is according to the market price. It is not a very cheap solution. They have some very aggressive promotions to sell the product in the market."
"We pay $100 per user per month. One license for the site is around $17."
"It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"ThreatLocker's pricing seems justifiable."
"The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
report
Use our free recommendation engine to learn which ZTNA as a Service solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
9%
Manufacturing Company
9%
Construction Company
6%
Manufacturing Company
12%
Financial Services Firm
8%
Computer Software Company
7%
Government
6%
Computer Software Company
17%
Manufacturing Company
8%
Retailer
8%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise6
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise1
Large Enterprise3
By reviewers
Company SizeCount
Small Business51
Midsize Enterprise13
Large Enterprise8
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
Ask a question
Earn 20 points
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
My experience with pricing, setup cost, and licensing for ThreatLocker Zero Trust Endpoint Protection Platform is goo...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker Zero Trust Endpoint Protection Platform can be improved by providing admin rights that allow us to manag...
What is your primary use case for ThreatLocker Allowlisting?
My main use case for ThreatLocker Zero Trust Endpoint Protection Platform is to secure the server.A specific example ...
 

Also Known As

iBoss Cloud Platform
No data available
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
United States Air Force  FINRA Weight Watchers Rackspace  DataDog SageNet  Verdant Norwegian Cruise Line  VoiceBase  The Third Floor 
Information Not Available
Find out what your peers are saying about Appgate SDP vs. ThreatLocker Zero Trust Platform and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.