We performed a comparison between Citrix Secure Workspace Access and ThreatLocker Protect based on real PeerSpot user reviews.
Find out what your peers are saying about Tailscale, Twingate, Perimeter 81 and others in ZTNA."Virtual desktops and virtual apps are most valuable."
"It is easy and simple, and it has got an easy interface. It is not hard to learn. With just three clicks, you log in, and you're there."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"The sandbox functionality is fantastic."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"When we go to print, we have to go through secure print. The secure printing kind of takes a while. It is a little latent."
"INGPU for engineering software is an area of improvement."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"More visibility in the built-ins would be nice."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"The reporting could be improved."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"There are some times when applications get submitted, the hashes don't really line up."
More Citrix Secure Workspace Access Pricing and Cost Advice →
Citrix Secure Workspace Access is ranked 10th in ZTNA with 2 reviews while ThreatLocker Protect is ranked 9th in ZTNA with 13 reviews. Citrix Secure Workspace Access is rated 8.6, while ThreatLocker Protect is rated 9.2. The top reviewer of Citrix Secure Workspace Access writes "Makes it convenient to work from home, supports everything I need, and is easy to use". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". Citrix Secure Workspace Access is most compared with Appgate SDP, Cato SASE Cloud Platform and Perimeter 81, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security.
See our list of best ZTNA vendors.
We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.