Try our new research platform with insights from 80,000+ expert users

Comodo MDR vs ThreatLocker Cyber Hero MDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 29, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Comodo MDR
Ranking in Managed Detection and Response (MDR)
23rd
Average Rating
10.0
Reviews Sentiment
8.2
Number of Reviews
2
Ranking in other categories
No ranking in other categories
ThreatLocker Cyber Hero MDR
Ranking in Managed Detection and Response (MDR)
12th
Average Rating
9.2
Reviews Sentiment
8.7
Number of Reviews
9
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Managed Detection and Response (MDR) category, the mindshare of Comodo MDR is 0.3%, up from 0.1% compared to the previous year. The mindshare of ThreatLocker Cyber Hero MDR is 0.8%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Managed Detection and Response (MDR)
 

Featured Reviews

reviewer1134810 - PeerSpot reviewer
Useful to monitor and track any suspicious activities
I rate the tool's deployment ease as five out of ten. In our situation, our team doesn't understand what it means to configure your solution properly. Because in the end, if any security solution isn't configured correctly, it won't provide optimal protection. So, it's very clear that we need to balance the gaps in our team's skills and what the vendors can do to cover those gaps for us. The tool's agents are deployed on-premises and connect to a very secure API to a cloud console. From the cloud console, you start managing and controlling the workstation configurations. Deployment took a few days because it included extensive orientation for our team members.
Andres Plaza - PeerSpot reviewer
Enables granular control through Ringfencing and works seamlessly for us as an MSP
The most valuable feature is ringfencing. It enables us to only allow what needs to be allowed into the environment and keep out anything else. It permits applications to perform without accessing anything they are not supposed to. For instance, if an application tries to utilize the command prompt unnecessarily, it blocks this action while still allowing users to operate the application. Being able to let the user or the customer continue to use that application but block the application from using the command prompt because it is not necessary is great. Being able to inform customers about enhanced security from a zero-trust standpoint has significantly improved our sales. We are able to walk up to a customer or call a new prospect and let them know that we are going to keep them secure at a level that they have not seen before. We are able to explain to them how cybersecurity works through it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product is fairly new compared to others like Trend Micro or Symantec. However, it offers sophisticated features, especially in scanning and analyzing activities on workstations or servers. It can prevent malicious operations from spreading to other applications or the network. This feature is particularly effective because it operates at the IO level, unlike behavior or signature analysis used by other products. It contains threats and alerts administrators about whether they are false positives or real threats that need immediate action or support recommendations."
"One of the most valuable features is its around-the-clock, 365-day-a-year online technical support."
"Our customers now have the confidence that they can work without being impeded, losing access or getting compromised."
"ThreatLocker is worth every penny and a couple more."
"The ability to isolate the device when something is happening and the network access control element are valuable features."
"ThreatLocker's support and Cyber Heroes have the absolute best support in the industry, in my opinion, bar none."
"We stopped two attacks so far."
"The most valuable feature, in terms of protection, is the allowlist, which ensures that only IT-approved applications run."
"I believe it is probably the best around."
"It's secure, and we know it's secure."
 

Cons

"They should consider adopting the desktop version as a solution."
"I think having a higher level of MDR would be beneficial, although it's quite expensive. This would involve not just monitoring the network but also taking actions to stop and detect threats. We haven't implemented this yet, but we're considering it for our organization's plans."
"Pricing is a bit high, with a minimum of 50 devices. Lowering that for small companies would be great."
"We have seen a couple of approval requests come through where if the user types in a reason for why they need it, they'll get approved based on the reason versus the application that are actually required."
"As far as an improvement regarding ThreatLocker Cyber Hero MDR, there are still some things that, out of the box, it would be nice to have a more fine-grained ability to create certain exclusions."
"Pricing is a bit high, with a minimum of 50 devices. Lowering that for small companies would be great."
"From an MDR perspective, the solution can have the ability to ingest logs from other sources, such as M365, firewalls, external sources, and even cloud SaaS-based platforms. This way, we can obtain a holistic picture."
"We have not used it for long enough, but there are some things users have asked for, such as integration with other platforms for reporting. They want a single glass location to use all the tools."
"The Cyber Hero Support is not as effective as it is portrayed. There is a lot of miscommunication in notes, which are very buried and not easy to find."
"It would be great if they handled patch management, and I am aware that they are currently working on it."
 

Pricing and Cost Advice

"The pricing falls within the moderate range."
"The tool's pricing is high compared to other products. If you want to target a certain quantity, it should provide discounts to enterprises."
"ThreatLocker is worth every penny and a couple more."
"It is pretty good. We would have been one of the biggest partners in Ireland, so we got pretty good pricing at the start, and it is still competitive. Pricing depends on what we are up against."
"The pricing is not so bad. My clients do not like it, but they are following our pricing."
"It has been excellent."
report
Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
28%
Retailer
10%
Comms Service Provider
9%
Insurance Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Comodo MDR?
One of the most valuable features is its around-the-clock, 365-day-a-year online technical support.
What is your experience regarding pricing and costs for Comodo MDR?
The tool's pricing is high compared to other products. If you want to target a certain quantity, it should provide discounts to enterprises.
What needs improvement with Comodo MDR?
I think having a higher level of MDR would be beneficial, although it's quite expensive. This would involve not just monitoring the network but also taking actions to stop and detect threats. We ha...
What is your experience regarding pricing and costs for ThreatLocker Cyber Hero MDR?
The pricing is cost-efficient and provides good value given the level of security enhancement it provides.
What needs improvement with ThreatLocker Cyber Hero MDR?
There are still gaps in the EDR when benchmarked against SentinelOne, but it's improving quickly. The ability for ThreatLocker to digest the 365 logs provides an elevated level of 365 protection th...
What is your primary use case for ThreatLocker Cyber Hero MDR?
Our primary use case for ThreatLocker Cyber Hero MDR ( /products/threatlocker-cyber-hero-mdr-reviews ) is to reinforce a zero trust environment. We utilize it to avoid security faults and improve d...
 

Also Known As

Comodo Managed Detection and Response
No data available
 

Overview

Find out what your peers are saying about Comodo MDR vs. ThreatLocker Cyber Hero MDR and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.