

ThreatLocker Zero Trust Platform and Cisco Secure Access are prominent contenders in the cybersecurity domain, each offering unique capabilities to bolster organizational defenses. Given the data, ThreatLocker holds a competitive edge in cost-effectiveness and tool consolidation, while Cisco excels in integration and threat detection features.
Features: ThreatLocker offers a granular application control system that only allows essential applications to run, drastically reducing potential attack surfaces. It adopts a default-deny strategy, enhancing security and simplifying application requests. Cisco Secure Access is notable for its high integration capability with existing web proxies, includes advanced threat detection systems, and features a secure web gateway that augments its efficacy in protecting against web-based threats.
Room for Improvement: ThreatLocker could enhance its platform by integrating identity verification and multi-factor authentication to improve command security. Expanding compatibility with third-party SIEM tools would also support users in complex IT environments. Similarly, Cisco Secure Access faces critiques regarding its pricing structure, which some users find less competitive, especially in economically diverse regions, needing refinement in its complex licensing model.
Ease of Deployment and Customer Service: ThreatLocker is adaptable with various deployment setups including on-premises and hybrid clouds and earns high praise for excellent customer service, especially from its responsive Cyber Heroes team. Conversely, while Cisco Secure Access supports a broad range of deployment setups and is robust, feedback on its customer service varies, with some users finding it complex, particularly for newer adopters.
Pricing and ROI: ThreatLocker is generally perceived as offering competitive pricing, delivering substantial value through operational savings and minimizing the need for multiple security tools, resulting in a positive ROI. Cisco Secure Access, known for higher pricing, often faces criticism for lacking cost-effectiveness, particularly affecting small to mid-sized enterprises. This pricing issue stands juxtaposed against ThreatLocker's affordability and its recognized practical ROI benefits for budget-sensitive users.
At Amazon, we knew exactly how much it would cost if a fulfillment center was down for an hour.
The AI features further contribute by expediting threat detection and incident response, ensuring tangible returns through operational savings.
It is one of those tools that needs to work right out of the box, and thankfully, it does; it is reliable, and the setup time was quick and straightforward.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
Based on what we use ThreatLocker Zero Trust Endpoint Protection Platform for with the same functionalities and packaging, it was around 13 or 14 hours.
We have the MDR package as well, and just knowing someone is watching those endpoints at 3:00 a.m. is a lifesaver that you cannot put a dollar figure on.
Cisco TAC is very competent.
With our established point of contact within Cisco, our experience has greatly improved; we no longer log all issues through technical cases, as we can go directly to our account managers or customer service team, which expedites resolution.
This stems from their original business in networking, integrating router and switch operations, as well as security devices.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
We turn the traffic to the Cisco Secure Access cloud, and we can manage and apply the policies that are necessary, making it very easy to scale the solution.
I would rate scalability at eight to nine out of ten.
Cisco Secure Access scales with the growing needs of our company.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
ThreatLocker Zero Trust Endpoint Protection Platform scales very smoothly with our growing needs.
Cisco is renowned for their reliability, and their products perform well under high data usage.
I rate the stability of Cisco Secure Access as ten out of ten.
The solution is stable enough, and I did not experience any latency or performance issues.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
Modernization is needed, specifically in the enhancement of security features and functionality.
It was challenging to learn because it has a significant learning curve and requires considerable training to become proficient.
The granular access issue is coming from the product limitation at the moment, as it does not offer us the option to tell it that a particular role can only manage websites, allowed sites, and blocked sites.
Controlling the cloud environment, not just endpoints, is crucial.
ThreatLocker Zero Trust Endpoint Protection Platform could improve by being a little more hands-off, perhaps by having a team inside ThreatLocker that does all the vetting of patches; having one person hired by ThreatLocker to check out patches means that a million other industries using ThreatLocker Zero Trust Endpoint Protection Platform do not have to vet the same patch, ultimately saving time and money around the world.
This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.
The solution is cheaper than premium options such as Palo Alto, existing Cisco licenses facilitate replacing previous solutions with Cisco Secure Access smoothly and affordably.
It is good because you want to push Cisco Secure Access, and regarding the price, it is very much below other products.
Renewal prices have been surprisingly high.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
Money is saved because it is not costly, and I would suggest it for other companies.
It eliminates the hassle of switching on VPNs and provides a direct connection to resources via Cisco Secure Access.
They are sending the traffic encrypted and categorizing the traffic based on the type, whether web traffic or internet traffic, and doing the security mechanism that is needed for the traffic type.
Using ZTNA in Cisco Secure Access has positively affected my transition and my clients' transition to Zero Trust and least privilege principles, reinforcing the security posture.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
| Product | Mindshare (%) |
|---|---|
| ThreatLocker Zero Trust Endpoint Protection Platform | 3.1% |
| Cisco Secure Access | 3.0% |
| Other | 93.9% |


| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 8 |
| Large Enterprise | 27 |
| Company Size | Count |
|---|---|
| Small Business | 51 |
| Midsize Enterprise | 13 |
| Large Enterprise | 8 |
Cisco Secure Access is a comprehensive Security Service Edge (SSE) solution (a key component of a SASE solution) that addresses the complexities of securing a hybrid enterprise. Cloud-delivered and grounded in zero trust, it delivers a unique blend of user simplicity and IT efficiency for frictionless, secure access to all applications—SaaS (with gen AI), private apps, and the internet—regardless of user location or device. Secure Access protects users, data, and devices against relentless, sophisticated, and constantly evolving threats including AI-driven attacks and identity breaches.
Provides all core SSE components (ZTNA, SWG, CASB, and FWaaS) plus extended capabilities.
Includes VPN-as-a-Service (VPNaaS), data loss prevention (DLP), AI Assistant, visibility/control/guardrails for generative AI use, digital experience monitoring (DEM), reserved IP, remote browser isolation (RBI), DNS-layer security, flexible security enforcement (in cloud or on-premises), policy verification, and more.
Protects users as they seamlessly access resources and apps with no extra steps needed, regardless of protocol, port, or level of customization
Simplifies IT operations through a single client, single dashboard, single license, and unified policies.
Lowers risk with least privilege, granular controls backed with unmatched threat intelligence of Cisco Talos.
Eases interoperability with other products from Cisco and third-party vendors with common administrative controls, data structures, and policy management.
Robust integrations
Integrates with Cisco Identity Intelligence to protect against the startling increase in identity-based attacks.
Integrates with many SAML Identity Providers (IDPs) such as AD, Azure AD, Okta, Ping, etc.
Integrates with Cisco offerings including SD-WAN, Splunk, XDR, Thousand Eyes, third party technologies such as Menlo RBI, Chrome Enterprise Browser, and AppOmni for SSPM.
Gain proactive, industry leading Zero Trust cybersecurity capabilities with ThreatLocker. By employing a deny-by-default approach, you will greatly enhance your security and operational efficiency. Solutions from ThreatLocker are focused on precise application control and
streamlined access management without administrative rights.
ThreatLocker Application Control solutions include Zero Trust Alllowlisting, Zero Trust Ringfencing and Privilege Access Management, significantly reducing any unauthorized software activities in your environment. Granular controls improve your overall security, while ringfencing enhances application behavior monitoring. Elevation requests will allow users to gain administrative access without IT intervention. The platform's ease of policy management and real-time threat visibility contribute to reduced help desk tickets and operational costs, ensuring protection against ransomware and
unauthorized applications.
What are the key features of ThreatLocker Zero Trust Platform?
What benefits and ROI should users expect?
Organizations often deploy ThreatLocker to ensure endpoint security in industries requiring stringent application control and administrative access management. Its functionalities are critical for managing Shadow IT, creating policies, and overseeing software installation approvals. Common usage spans sectors demanding robust security and compliance, such as finance and healthcare, where maintaining high
security and efficiency is crucial.
We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.