Citrix Secure Workspace Access vs ThreatLocker Protect comparison

Cancel
You must select at least 2 products to compare!
Citrix Logo
232 views|115 comparisons
100% willing to recommend
ThreatLocker Logo
30 views|26 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Citrix Secure Workspace Access and ThreatLocker Protect based on real PeerSpot user reviews.

Find out what your peers are saying about Tailscale, Twingate, Perimeter 81 and others in ZTNA.
To learn more, read our detailed ZTNA Report (Updated: April 2024).
770,141 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Virtual desktops and virtual apps are most valuable.""It is easy and simple, and it has got an easy interface. It is not hard to learn. With just three clicks, you log in, and you're there."

More Citrix Secure Workspace Access Pros →

"The interface is clean and well-organized, making it simple to navigate and find what we need.""The sandbox functionality is fantastic.""Application control, ring-fencing, and storage control are the most important features, followed closely by elevation.""While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist.""Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it.""The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself.""The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines.""The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."

More ThreatLocker Protect Pros →

Cons
"When we go to print, we have to go through secure print. The secure printing kind of takes a while. It is a little latent.""INGPU for engineering software is an area of improvement."

More Citrix Secure Workspace Access Cons →

"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.""More visibility in the built-ins would be nice.""The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software.""From a reporting perspective, enhancing the ability to customize reports would be beneficial.""The reporting could be improved.""One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system.""Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats.""There are some times when applications get submitted, the hashes don't really line up."

More ThreatLocker Protect Cons →

Pricing and Cost Advice
  • "There are costs in addition to the standard licensing fees. They should provide better licensing options."
  • More Citrix Secure Workspace Access Pricing and Cost Advice →

  • "Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
  • "Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
  • "The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
  • "The pricing works fine for me. It's very reasonably priced."
  • "The pricing is fair and there is no hard sell."
  • "The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
  • "I find ThreatLocker's pricing to be reasonable for the services it provides."
  • "I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
  • More ThreatLocker Protect Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
    770,141 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Virtual desktops and virtual apps are most valuable.
    Top Answer:INGPU for engineering software is an area of improvement. There should be better licensing options.
    Top Answer:It is used for INGPU AutoCAD and clerical work. Its deployment is hybrid. It is deployed on a public Azure cloud and on-prem.
    Top Answer:The interface is clean and well-organized, making it simple to navigate and find what we need.
    Top Answer:ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program itself, and everything related to it being top-notch. If my CTO ever suggested… more »
    Top Answer:The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.
    Ranking
    10th
    out of 34 in ZTNA
    Views
    232
    Comparisons
    115
    Reviews
    1
    Average Words per Review
    395
    Rating
    8.0
    9th
    out of 34 in ZTNA
    Views
    30
    Comparisons
    26
    Reviews
    9
    Average Words per Review
    1,919
    Rating
    9.1
    Comparisons
    Also Known As
    Citrix Access Control, Citrix Secure Internet Access
    ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
    Learn More
    Overview

    Access control is a fundamental component of data security that dictates who’s allowed to access and use company information and resources. Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data. Access control can also be applied to limit physical access to campuses, buildings, rooms, and data centers.

    The ThreatLocker platform is a robust Zero Trust endpoint security solution, safeguarding organizations against ransomware, malware, and various cyber threats through a unified approach. It incorporates key features like Application Allowlisting, Ringfencing, and Dynamic Network Control. Application Allowlisting ensures that only authorized applications run on endpoints, preventing unauthorized software and thwarting ransomware and malware threats. Ringfencing isolates approved applications from one another and the operating system, inhibiting malware spread and unauthorized access to sensitive data. Dynamic Network Control regulates traffic, enhancing security by closing unused ports and opening them as needed for authorized connections. The ThreatLocker platform simplifies security management with a centralized console and supports Windows, macOS, and Linux endpoints. 

    Sample Customers
    The Messenger
    Information Not Available
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Computer Software Company39%
    Retailer6%
    Government5%
    Healthcare Company5%
    Company Size
    No Data Available
    REVIEWERS
    Small Business93%
    Midsize Enterprise7%
    VISITORS READING REVIEWS
    Small Business56%
    Midsize Enterprise12%
    Large Enterprise31%
    Buyer's Guide
    ZTNA
    April 2024
    Find out what your peers are saying about Tailscale, Twingate, Perimeter 81 and others in ZTNA. Updated: April 2024.
    770,141 professionals have used our research since 2012.

    Citrix Secure Workspace Access is ranked 10th in ZTNA with 2 reviews while ThreatLocker Protect is ranked 9th in ZTNA with 13 reviews. Citrix Secure Workspace Access is rated 8.6, while ThreatLocker Protect is rated 9.2. The top reviewer of Citrix Secure Workspace Access writes "Makes it convenient to work from home, supports everything I need, and is easy to use". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". Citrix Secure Workspace Access is most compared with Appgate SDP, Cato SASE Cloud Platform and Perimeter 81, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security.

    See our list of best ZTNA vendors.

    We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.