Cato SASE Cloud Platform vs ThreatLocker Protect comparison

Cancel
You must select at least 2 products to compare!
Cato Networks Logo
6,691 views|3,733 comparisons
100% willing to recommend
ThreatLocker Logo
30 views|26 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cato SASE Cloud Platform and ThreatLocker Protect based on real PeerSpot user reviews.

Find out in this report how the two ZTNA solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Cato SASE Cloud Platform vs. ThreatLocker Protect Report (Updated: March 2024).
770,141 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The visibility control and security aspects are amazing.""The WAN aggregation feature is the most valuable.""The product is efficient and easy to use.""When I first encountered Cato, I didn't know how to use it, but after a week of training, I could onboard our systems to it, so the solution was easy to learn and navigate.""I haven't had any trouble, and practically forget that I'm using it.""We appreciate the optimization and acceleration of the performance of SDP users.""It's a cloud-based solution that integrates well with everything.""The feature that I find to be the most valuable is the bandwidth aggregation."

More Cato SASE Cloud Platform Pros →

"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network.""Every single feature has been invaluable.""We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running.""While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist.""The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines.""ThreatLocker Allowlisting has all of these features integrated into one console, making it effective.""Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it.""The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."

More ThreatLocker Protect Pros →

Cons
"They should add more sophisticated security features. It should also be integrated into the cloud.""Cato Networks could improve their intrusion detection. There is not a lot in place.""The product must evolve into the endpoint domain.""The product may be complex for users with few years of experience.""The solution is not cheap.""For a packaged solution, needing external intervention or a system integrator to get other features not offered by Cato Networks could be an area for improvement. Cato Networks does what it's meant to do and is even overstretching capabilities when introducing new features. The product can only have very few features added on top of what its currently doing. Managed service providers can deliver the extra features you'd need. It's a set of managed services, and what Cato Networks does is very comprehensive. So, for the time being, when the actual incarnation of the SASE solution is deployed, Cato Networks is a very effective product. Naturally, technology will evolve, so everybody knows that in three, four, or five years, there will be a new kid on the block, a new game. Still, at the moment, Cato Networks only needs to improve a little regarding SASE delivery. The product is doing very well, but one feature the Cato Networks team is doing right is preparing for the future through deploying the SSE 360, so the security service is at that edge. It's an excellent strategy to prepare for the future. SSE 360 is what Cato Networks should invest in the most to keep prospering.""The different languages in the user interface should be enhanced.""The tool needs to be more granular. Its reports are not very in-depth."

More Cato SASE Cloud Platform Cons →

"From a reporting perspective, enhancing the ability to customize reports would be beneficial.""Adding applications to the allowlist can sometimes feel overwhelming.""If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out.""We identified several areas that we would like to see improved.""There are some times when applications get submitted, the hashes don't really line up.""One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system.""ThreatLocker could offer more flexible training, like online or offline classes after hours. The fact that they even provide weekly training makes it seem silly to suggest, but some people can't do it during the day, so they want to train after work. They could also start a podcast about issues they see frequently and what requires attention. A podcast would be helpful to keep us all apprised about what's going on and/or offline training for those people who can't train during the week.""The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."

More ThreatLocker Protect Cons →

Pricing and Cost Advice
  • "The price is not an issue for us, as it is priced more competitively than some other vendors."
  • "If you compare with VeloCloud, the price is the same or even cheaper."
  • "You pay yearly based on the speed of your network. If you increase the speed of your network, you increase the cost for your throughput. It is by bandwidth for the most part and then licenses for VPN. There is some per-seat licensing for VPN access, but the majority of it is minimal. It is like $30 a year per client. The rest is based on how much bandwidth you'll use. You pay for that upfront for the year, and if you have to increase it, you increase it, and then they let you send more data through. There are no additional costs in addition to the standard licensing fees."
  • "Cato Networks seems more expensive than Cisco Meraki."
  • "The pricing of this solution depends on what you need. It is based on bandwidth."
  • "I rate the price of Cato Networks a four out of five."
  • "Cato Networks is an expensive product, but it works out of the box, so that's the usual trade-off, make versus buy. If you decide to buy a product that doesn't require much programming, then you'd want to go for Cato Networks, which will work naturally, and immediately without any complex setup. However, the product is a little bit more expensive than the competitors. On a scale of one to five, I'd rate the pricing for Cato Networks as four."
  • "The product is very competitively priced, and that's compelling. They don't charge the customer based on the operational cost like other brands such as Palo Alto. Cato has its own fully-fledged cloud, with their own data centers, equipment, and so on, which is an advantage. I rate the solution five out of five for affordability."
  • More Cato SASE Cloud Platform Pricing and Cost Advice →

  • "Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
  • "Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
  • "The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
  • "The pricing works fine for me. It's very reasonably priced."
  • "The pricing is fair and there is no hard sell."
  • "The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
  • "I find ThreatLocker's pricing to be reasonable for the services it provides."
  • "I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
  • More ThreatLocker Protect Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
    770,141 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The solution is a simple WAN solution. We've onboarded the socket on the Cato platform, and it provides connectivity. There is no complex routing.
    Top Answer:We use the solution as a WAN, but we plan to optimize it by incorporating security features like zero trust for enhanced insights.
    Top Answer:In terms of security, we are planning to deploy more features and our current usage is primarily focused on branch networking. I rate the tool a nine out of ten. I rate the product a nine out of ten… more »
    Top Answer:The interface is clean and well-organized, making it simple to navigate and find what we need.
    Top Answer:ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program itself, and everything related to it being top-notch. If my CTO ever suggested… more »
    Top Answer:The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.
    Ranking
    Views
    6,691
    Comparisons
    3,733
    Reviews
    10
    Average Words per Review
    500
    Rating
    8.8
    9th
    out of 34 in ZTNA
    Views
    30
    Comparisons
    26
    Reviews
    9
    Average Words per Review
    1,919
    Rating
    9.1
    Comparisons
    Also Known As
    Cato Networks
    ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
    Learn More
    Overview

    Cato Networks is a leading SASE (Secure Access Service Edge) platform, combining SD-WAN and network security to obtain a cloud-native service. Cato Networks optimizes and secures application access for users and identities. The platform delivers a next-generation secure networking architecture that minimizes legacy IT infrastructures’ complexity, costs, and risks. The goal of Cato Suite is to connect any user to any application securely and optimally.

    Cato Suite runs on a private global network of more than 65 PoPs (points of presence) connected via SLA-backed network providers. The service can connect branches, data centers, users, and clouds. Cato can be deployed in stages to augment legacy network services.

    Cato Suite delivers end-to-end route optimization for WAN and cloud traffic. The architecture is self-healing, enabling a high service uptime.

    Cato Features

    Cato Cloud has a global backbone to deliver a reliable, global network. Here are some key SD-WAN features of Cato Cloud.

    • Optimizes traffic flows: The Cato Suite can individually optimize traffic flows in the last mile - from the customer’s location to the point of presence, and also between PoPs. This feature eliminates the need for internet providers to hand off traffic to each other, avoiding the resulting latency and congestion.
    • Controls and manages bandwidth: The software-defined overlay is encrypted across the entire cloud infrastructure. This overlay uses application-aware routing, analyzing latency and loss data to choose the best route according to network conditions. These features, like protocol priority marking, enable the system to ensure the performance of real-time applications.
    • Delivers redundancy and failover: By connecting the points of presence with multiple Tier-1 IPs, Cato builds the redundancy needed to ensure security and highly available service.
    • Cloud-native: Cato is built as a scalable, resilient, and elastic cloud service.
    • Converged: The platform converges SD-WAN and network security into a single infrastructure framework.
    • Secures all edges: Cato Network can secure and optimize traffic from all users, locations, applications, and clouds.

    What challenges does Cato Network solve?

    • Migration to SD-WAN

    MPLS (multi-protocol label switching) networks are usually expensive and limited in their capacity. Cato simplifies migrating to a faster, higher-capacity internet and SASE cloud. Cato SD-WAN appliances enable customers to improve usable capacity and resiliency.

    • Global connectivity optimization

    Customers who suffer from the challenge of high latency and network inconsistency can use Cato to deliver a consistent connection and user experience to access on-premises and cloud applications.

    • Securing branch internet access

    Cato’s complete network security stack connects all branch locations to the Cato cloud, therefore protecting all traffic, both internet-bound and WAN, with enterprise-grade, cloud-based security services. This capability avoids having to backhaul internet traffic to a data center or hub or having to implement stand-alone cloud security solutions.

    • Cloud acceleration and control

    Organizations using Cato notice an acceleration of cloud traffic. Cato achieves this by routing all traffic from the edges to the PoP closest to the data center. Because of the close distance between the two, the latency is near zero.

    Reviews from Real Users

    An IT manager/project coordinator at a healthcare company says that “[Cato is] a cloud-based solution that integrates well with everything. They are the classic SaaS solution.”

    Yeong-Gi L., a network engineer at Snetsystems, notes that “The solution is very stable. The scalability is quite good. Technical support was always helpful and responsive. The integration capabilities are not a problem at all.”

    "The most valuable feature is that it also works as a next-gen firewall because it has security features," says Lorenzo S., senior solutions consultant Lead at MDI.

    The ThreatLocker platform is a robust Zero Trust endpoint security solution, safeguarding organizations against ransomware, malware, and various cyber threats through a unified approach. It incorporates key features like Application Allowlisting, Ringfencing, and Dynamic Network Control. Application Allowlisting ensures that only authorized applications run on endpoints, preventing unauthorized software and thwarting ransomware and malware threats. Ringfencing isolates approved applications from one another and the operating system, inhibiting malware spread and unauthorized access to sensitive data. Dynamic Network Control regulates traffic, enhancing security by closing unused ports and opening them as needed for authorized connections. The ThreatLocker platform simplifies security management with a centralized console and supports Windows, macOS, and Linux endpoints. 

    Sample Customers
    Paysafe, AdRoll, Pet Lovers Centre, Arlington Orthopedics, Humphreys & Partners Architects
    Information Not Available
    Top Industries
    REVIEWERS
    Retailer18%
    Healthcare Company18%
    Insurance Company9%
    Energy/Utilities Company9%
    VISITORS READING REVIEWS
    Computer Software Company28%
    Manufacturing Company9%
    Financial Services Firm6%
    Retailer6%
    VISITORS READING REVIEWS
    Computer Software Company39%
    Retailer6%
    Government5%
    Healthcare Company5%
    Company Size
    REVIEWERS
    Small Business43%
    Midsize Enterprise24%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise30%
    Large Enterprise45%
    REVIEWERS
    Small Business93%
    Midsize Enterprise7%
    VISITORS READING REVIEWS
    Small Business56%
    Midsize Enterprise12%
    Large Enterprise31%
    Buyer's Guide
    Cato SASE Cloud Platform vs. ThreatLocker Protect
    March 2024
    Find out what your peers are saying about Cato SASE Cloud Platform vs. ThreatLocker Protect and other solutions. Updated: March 2024.
    770,141 professionals have used our research since 2012.

    Cato SASE Cloud Platform is ranked 5th in Secure Access Service Edge (SASE) with 21 reviews while ThreatLocker Protect is ranked 9th in ZTNA with 13 reviews. Cato SASE Cloud Platform is rated 8.8, while ThreatLocker Protect is rated 9.2. The top reviewer of Cato SASE Cloud Platform writes "Useful remote worker VPN, centralized management, and simple on-boarding process". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". Cato SASE Cloud Platform is most compared with Zscaler Zero Trust Exchange, Cisco SD-WAN, Prisma Access by Palo Alto Networks, Fortinet FortiGate and VMware SD-WAN, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security. See our Cato SASE Cloud Platform vs. ThreatLocker Protect report.

    See our list of best ZTNA vendors.

    We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.