Check Point Application Control vs ThreatLocker Protect comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
911 views|131 comparisons
100% willing to recommend
ThreatLocker Logo
30 views|16 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Application Control and ThreatLocker Protect based on real PeerSpot user reviews.

Find out in this report how the two Application Control solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point Application Control vs. ThreatLocker Protect Report (Updated: May 2024).
771,170 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Its initial setup is very simple and straightforward.""Check Point enables us to save internet bandwidth. The administration offers good guidance. We don't want the employees to access social networking on work computers because it will distract them from their jobs, so we can block that. It also helps us to implement changes very quickly and to get people to be more focused on the job.""The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database.""We love Check Point Application Control for its granular control and to be able to apply policies between groups, hosts, and networks depending on the need.""We can combine Application Control with Identity Awareness and URL Filtering to create security policies for users/groups based on characteristics about security, productivity and network bandwidth.""The tool's most valuable features are VPN access, website defense, and maintenance.""One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles.""The overall security of the environment has been greatly improved by the Check Point NGFWs. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers, which in fact a simple stateful firewall, and currently appear to be not an efficient solution for protecting from the advanced threats."

More Check Point Application Control Pros →

"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network.""ThreatLocker Allowlisting has all of these features integrated into one console, making it effective.""The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself.""We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running.""Application control, ring-fencing, and storage control are the most important features, followed closely by elevation.""While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist.""The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines.""Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."

More ThreatLocker Protect Pros →

Cons
"I recommend network upgrades in the next release to meet most company demands and daily changes.""It is expensive.""There are many aspects we do not like about the solution and there are a lot of alternatives available on the market. Some of the settings are buried deep within the solution making it a challenge to navigate. It would be helpful if it was more intuitive. Additionally, there can be some settings that are in multiple places, this leaves the user not knowing what settings are needed to be modified for the wanted result. I have lost confidence because I do not know if I change a setting or if it is going to have the desired result I intended it to do.""Malware threats can advance attacks when there are no timely measures to curb online phishing attacks.""Seeing the capabilities and features that we are using today, we can say that we could expect an additional feature that could allow us to integrate this management and even security with APIs.""Configuration and deployment are a little bit difficult.""They are expensive products due to the fact that we have to buy blades for each solution that we want to integrate into our corporate.""At the moment I don't see the need to add new features. That said, you always have to be one step ahead."

More Check Point Application Control Cons →

"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats.""From a reporting perspective, enhancing the ability to customize reports would be beneficial.""The reporting could be improved.""More visibility in the built-ins would be nice.""ThreatLocker Allowlisting needs to improve its user interface and overall workflow.""There are some times when applications get submitted, the hashes don't really line up.""Adding applications to the allowlist can sometimes feel overwhelming.""We identified several areas that we would like to see improved."

More ThreatLocker Protect Cons →

Pricing and Cost Advice
  • "It's a bit expensive and it could be cheaper, but it's part of business politics."
  • "I think application control has become a basic feature and it should be enabled automatically, without having to purchase a separate license for it."
  • "The blade has its cost but you can take advantage of the license package to pay less for it."
  • "The price of Check Point Application Control is high. The support and ecosystem around the solution are expensive."
  • "Check Point Application Control is expensive. The tool's licensing costs are yearly."
  • More Check Point Application Control Pricing and Cost Advice →

  • "Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
  • "Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
  • "The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
  • "The pricing works fine for me. It's very reasonably priced."
  • "The pricing is fair and there is no hard sell."
  • "The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
  • "I find ThreatLocker's pricing to be reasonable for the services it provides."
  • "I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
  • More ThreatLocker Protect Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Application Control solutions are best for your needs.
    771,170 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It has many important features that have greatly helped the company and the IT department.
    Top Answer:If someone wants to review the configuration for the proxy, they would need to look elsewhere, as this tool is not designed to assess the performance of security policies.
    Top Answer:The interface is clean and well-organized, making it simple to navigate and find what we need.
    Top Answer:ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program itself, and everything related to it being top-notch. If my CTO ever suggested… more »
    Top Answer:The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.
    Ranking
    1st
    Views
    911
    Comparisons
    131
    Reviews
    21
    Average Words per Review
    532
    Rating
    8.7
    4th
    Views
    30
    Comparisons
    16
    Reviews
    9
    Average Words per Review
    1,919
    Rating
    9.1
    Comparisons
    Also Known As
    ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
    Learn More
    Overview


    Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies, based on users or groups, to identify, block or limit usage of thousands of Web applications and widgets.

    Learn more about Application control software

    The ThreatLocker platform is a robust Zero Trust endpoint security solution, safeguarding organizations against ransomware, malware, and various cyber threats through a unified approach. It incorporates key features like Application Allowlisting, Ringfencing, and Dynamic Network Control. Application Allowlisting ensures that only authorized applications run on endpoints, preventing unauthorized software and thwarting ransomware and malware threats. Ringfencing isolates approved applications from one another and the operating system, inhibiting malware spread and unauthorized access to sensitive data. Dynamic Network Control regulates traffic, enhancing security by closing unused ports and opening them as needed for authorized connections. The ThreatLocker platform simplifies security management with a centralized console and supports Windows, macOS, and Linux endpoints. 

    Sample Customers
    SEB, Luma Arles, Terma, Aerospace, Midwest Rubber
    Information Not Available
    Top Industries
    REVIEWERS
    Financial Services Firm23%
    Computer Software Company19%
    Security Firm15%
    Logistics Company12%
    VISITORS READING REVIEWS
    Comms Service Provider15%
    Security Firm15%
    Computer Software Company10%
    Financial Services Firm9%
    VISITORS READING REVIEWS
    Computer Software Company39%
    Retailer6%
    Government6%
    Healthcare Company5%
    Company Size
    REVIEWERS
    Small Business32%
    Midsize Enterprise30%
    Large Enterprise39%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise11%
    Large Enterprise62%
    REVIEWERS
    Small Business93%
    Midsize Enterprise7%
    VISITORS READING REVIEWS
    Small Business57%
    Midsize Enterprise12%
    Large Enterprise31%
    Buyer's Guide
    Check Point Application Control vs. ThreatLocker Protect
    May 2024
    Find out what your peers are saying about Check Point Application Control vs. ThreatLocker Protect and other solutions. Updated: May 2024.
    771,170 professionals have used our research since 2012.

    Check Point Application Control is ranked 1st in Application Control with 34 reviews while ThreatLocker Protect is ranked 4th in Application Control with 13 reviews. Check Point Application Control is rated 8.8, while ThreatLocker Protect is rated 9.2. The top reviewer of Check Point Application Control writes "Reliable, reduces management requirements, and lessens manual interventions". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". Check Point Application Control is most compared with VMware Carbon Black App Control, Ivanti Application Control and WatchGuard Application Control, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security. See our Check Point Application Control vs. ThreatLocker Protect report.

    See our list of best Application Control vendors.

    We monitor all Application Control reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.