Try our new research platform with insights from 80,000+ expert users

CompassOne by Blackpoint Cyber vs ThreatLocker Cyber Hero MDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CompassOne by Blackpoint Cyber
Ranking in Managed Detection and Response (MDR)
13th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
5
Ranking in other categories
Security Information and Event Management (SIEM) (33rd), Vulnerability Management (40th), Endpoint Detection and Response (EDR) (33rd), Application Control (9th)
ThreatLocker Cyber Hero MDR
Ranking in Managed Detection and Response (MDR)
11th
Average Rating
9.2
Reviews Sentiment
8.7
Number of Reviews
9
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Managed Detection and Response (MDR) category, the mindshare of CompassOne by Blackpoint Cyber is 3.7%, down from 5.4% compared to the previous year. The mindshare of ThreatLocker Cyber Hero MDR is 1.0%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Managed Detection and Response (MDR) Market Share Distribution
ProductMarket Share (%)
ThreatLocker Cyber Hero MDR1.0%
CompassOne by Blackpoint Cyber3.7%
Other95.3%
Managed Detection and Response (MDR)
 

Featured Reviews

Gary Herbstman - PeerSpot reviewer
Experienced reduced alert fatigue with streamlined notifications
We use Blackpoint Cyber MDR for our higher-end clients who need a higher level of control over security I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real. This feature ensures that I am notified only…
Andres Plaza - PeerSpot reviewer
Enables granular control through Ringfencing and works seamlessly for us as an MSP
The most valuable feature is ringfencing. It enables us to only allow what needs to be allowed into the environment and keep out anything else. It permits applications to perform without accessing anything they are not supposed to. For instance, if an application tries to utilize the command prompt unnecessarily, it blocks this action while still allowing users to operate the application. Being able to let the user or the customer continue to use that application but block the application from using the command prompt because it is not necessary is great. Being able to inform customers about enhanced security from a zero-trust standpoint has significantly improved our sales. We are able to walk up to a customer or call a new prospect and let them know that we are going to keep them secure at a level that they have not seen before. We are able to explain to them how cybersecurity works through it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"On my end, the most valuable feature of this solution is that I can install it and forget about it. After that, their SOC team takes over and they only call me when there's a problem."
"The solution also watches over Microsoft 365 and keeps a copy of logs."
"The solution is all encompassing and can incorporate email monitoring."
"On a scale from one to ten, I would rate the overall solution as a ten."
"Their SOC is phenomenal in not monitoring and responding and taking action."
"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"It's an important solution to have in order to maintain a strong security posture, especially as we're seeing things like supply chain attacks, where people are accidentally downloading malware from our vendors."
"There is a tremendous amount that is helpful, such as their recording, watching the systems, locking down the systems, and their training."
"I believe it is probably the best around."
"The most valuable feature, in terms of protection, is the allowlist, which ensures that only IT-approved applications run."
"We stopped two attacks so far."
"Our customers now have the confidence that they can work without being impeded, losing access or getting compromised."
"It's secure, and we know it's secure."
"The customer service is really good."
 

Cons

"The interface could be more intuitive. More transparency is needed in the interface as a lot of details are hidden behind the scenes, making them difficult or impossible to access."
"Some texts seem to report items as normal too quickly."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"The feature we keep asking for is a vulnerability scan."
"The solution does not tie into other EDR products like CyberArk or CrowdStrike but that might be more useful."
"The interface could be more intuitive."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"From an MDR perspective, the solution can have the ability to ingest logs from other sources, such as M365, firewalls, external sources, and even cloud SaaS-based platforms. This way, we can obtain a holistic picture."
"There are still gaps in the EDR when benchmarked against SentinelOne, but it's improving quickly."
"The Cyber Hero Support is not as effective as it is portrayed. There is a lot of miscommunication in notes, which are very buried and not easy to find."
"It would be great if they handled patch management, and I am aware that they are currently working on it."
"We have seen a couple of approval requests come through where if the user types in a reason for why they need it, they'll get approved based on the reason versus the application that are actually required."
"As far as an improvement regarding ThreatLocker Cyber Hero MDR, there are still some things that, out of the box, it would be nice to have a more fine-grained ability to create certain exclusions."
"The Cyber Hero Support is not as effective as it is portrayed. There is a lot of miscommunication in notes, which are very buried and not easy to find."
"Pricing is a bit high, with a minimum of 50 devices. Lowering that for small companies would be great."
 

Pricing and Cost Advice

"The pricing is reasonable."
"The pricing is in line with other products."
"ThreatLocker is worth every penny and a couple more."
"The pricing is not so bad. My clients do not like it, but they are following our pricing."
"It is pretty good. We would have been one of the biggest partners in Ireland, so we got pretty good pricing at the start, and it is still competitive. Pricing depends on what we are up against."
"It has been excellent."
report
Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
872,019 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
8%
Healthcare Company
7%
Retailer
7%
Computer Software Company
26%
Retailer
10%
Financial Services Firm
8%
Comms Service Provider
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business8
 

Questions from the Community

What needs improvement with Blackpoint Cyber MDR?
While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement.
What is your primary use case for Blackpoint Cyber MDR?
The solution serves as a baseline security offering. We have implemented it for every client that we do business with.
What is your experience regarding pricing and costs for ThreatLocker Cyber Hero MDR?
The pricing is cost-efficient and provides good value given the level of security enhancement it provides.
What needs improvement with ThreatLocker Cyber Hero MDR?
There are still gaps in the EDR when benchmarked against SentinelOne, but it's improving quickly. The ability for ThreatLocker to digest the 365 logs provides an elevated level of 365 protection th...
What is your primary use case for ThreatLocker Cyber Hero MDR?
Our primary use case for ThreatLocker Cyber Hero MDR ( /products/threatlocker-cyber-hero-mdr-reviews ) is to reinforce a zero trust environment. We utilize it to avoid security faults and improve d...
 

Also Known As

Blackpoint Cyber Managed Detection + Response, Blackpoint Cyber Managed Detection and Response
No data available
 

Overview

 

Sample Customers

CoreRecon, Peerless Tech Solutions, Lorien Health
Information Not Available
Find out what your peers are saying about CompassOne by Blackpoint Cyber vs. ThreatLocker Cyber Hero MDR and other solutions. Updated: September 2025.
872,019 professionals have used our research since 2012.