Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs ThreatLocker Zero Trust Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 17, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
4.8
Cortex XDR offers significant ROI with enhanced security and efficiency, reducing costs, incidents, and boosting user satisfaction.
Sentiment score
7.2
CyberArk Endpoint Privilege Manager enhances security, reduces risks and costs, saves resources, and protects sensitive information effectively.
Sentiment score
6.5
ThreatLocker Zero Trust Platform reduces costs and risks while increasing revenue and improving IT efficiency and confidence.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cyber Security Manager at Welab bank
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
Detection and Response Consultant at Inovasys
I have seen a return on investment with Cortex XDR by Palo Alto Networks, as this product is offered at a minimal cost, and we can find a good ROI from it.
Cyber Security Information Security Specialist at MHM Holding GmbH
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
Lead Consultant at a tech vendor with 501-1,000 employees
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
Commercial and Technical Professional Manager at Evolution Technologies Group
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
Tier 1 IT Engineer at a retailer with 11-50 employees
Based on what we use ThreatLocker Zero Trust Endpoint Protection Platform for with the same functionalities and packaging, it was around 13 or 14 hours.
Head Of Cyber Security at a outsourcing company with 201-500 employees
We have the MDR package as well, and just knowing someone is watching those endpoints at 3:00 a.m. is a lifesaver that you cannot put a dollar figure on.
System Administrator at Gwynedd Mercy University
 

Customer Service

Sentiment score
6.9
Cortex XDR support is praised for proficiency, but regional differences exist in response times and expertise consistency.
Sentiment score
6.2
CyberArk Endpoint Privilege Manager support is knowledgeable but needs improvements in response times, accessibility, and first-level assistance.
Sentiment score
8.0
ThreatLocker Zero Trust Platform's customer service is praised for responsiveness and expertise, often resolving issues efficiently and professionally.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
Head of data centers at a non-profit with 10,001+ employees
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
Senior Process Expert at A.P. Moller - Maersk
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
Chief of IT Architecture at a financial services firm with 10,001+ employees
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
Security Delivery Analyst at Accenture
We engage them when needed and receive prompt responses that typically resolve our issues.
Global Security Systems Consultant at a insurance company with 10,001+ employees
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
Lead Consultant at a tech vendor with 501-1,000 employees
They have been very responsive, helpful, and knowledgeable.
Systems Security Analyst & Deputy Security Officer at a financial services firm with 201-500 employees
I would rate their customer support a ten out of ten.
Director, Managed Services at a consultancy with 11-50 employees
Their support is world-class.
Supervisor, Client Security at a consultancy with 11-50 employees
 

Scalability Issues

Sentiment score
7.5
Cortex XDR provides scalable, efficient performance for thousands of users, supporting easy cloud and on-premises expansions with simple licensing.
Sentiment score
7.7
CyberArk Endpoint Privilege Manager efficiently scales for large deployments, praised for growth-centered architecture despite integration complexities.
Sentiment score
7.8
ThreatLocker Zero Trust Platform scales seamlessly, enabling easy expansion and flexible integration for diverse organizations without significant deployment issues.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Assistant Security Architect at Cloudnomics
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
Head of data centers at a non-profit with 10,001+ employees
I think scalability for Cortex XDR by Palo Alto Networks is good.
Threat Analyst II at a tech vendor with 1,001-5,000 employees
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
Global Security Systems Consultant at a insurance company with 10,001+ employees
CyberArk Endpoint Privilege Manager is quite scalable.
Security Delivery Analyst at Accenture
The available reports and other security tools assist in scaling it according to my organization's needs.
Cybersecurity Manager at a consultancy with 10,001+ employees
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
Technical Engineer at Cloud 1 Solutions
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
Systems Security Analyst & Deputy Security Officer at a financial services firm with 201-500 employees
ThreatLocker Zero Trust Endpoint Protection Platform scales very smoothly with our growing needs.
CEO at Mostro
 

Stability Issues

Sentiment score
8.0
Cortex XDR by Palo Alto Networks is stable and reliable, with minimal issues and consistently high performance ratings.
Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable, with 99.99% uptime, reliable on Windows, needing console improvements and minimal memory.
Sentiment score
7.7
Users find ThreatLocker Zero Trust Platform stable and reliable, with rare issues and responsive support for effective endpoint protection.
Cortex remains fast and responsive, even with increasing data and alerts.
Final Year Student at Gitam University
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Senior Process Expert at A.P. Moller - Maersk
Cortex XDR is stable, offering high quality and reliable performance.
Cyber Security Manager at Welab bank
It is a robust solution that has effectively supported our environment without major issues.
Security Delivery Analyst at Accenture
Since implementing it, we have not experienced any outages or stability issues.
Global Security Systems Consultant at a insurance company with 10,001+ employees
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
Lead Consultant at a tech vendor with 501-1,000 employees
For five years, we have not had a problem.
Supervisor, Client Security at a consultancy with 11-50 employees
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
Information Cybersecurity Technology Specialist at Freez.it
It has been very stable, reliable, and accessible.
COO at Panda Technology
 

Room For Improvement

Cortex XDR needs better UI, reporting, customization, cloud integration, support, and reduced false positives and resource use.
CyberArk Endpoint Privilege Manager needs improved integration, user interface, and pricing, along with enhanced compatibility and functionality.
ThreatLocker Zero Trust Platform could improve compatibility, usability, reporting, response time, and add features like antivirus and better patch management.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
Final Year Student at Gitam University
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
Pre Sales Architect at network techlab
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
Cyber Security Information Security Specialist at MHM Holding GmbH
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Global Security Systems Consultant at a insurance company with 10,001+ employees
Currently, no user-based policy option is available inside the EPM console.
Lead Consultant at a tech vendor with 501-1,000 employees
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
Solution Architect at a consultancy with 10,001+ employees
Controlling the cloud environment, not just endpoints, is crucial.
COO at Panda Technology
ThreatLocker Zero Trust Endpoint Protection Platform could improve by being a little more hands-off, perhaps by having a team inside ThreatLocker that does all the vetting of patches; having one person hired by ThreatLocker to check out patches means that a million other industries using ThreatLocker Zero Trust Endpoint Protection Platform do not have to vet the same patch, ultimately saving time and money around the world.
Technical Support Engineer at CMIT Solutions of Central Orlando
This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.
Server Administrator at Clay County Sheriff's Office
 

Setup Cost

Cortex XDR offers flexible, scalable licensing with robust features, fair pricing, and options for on-prem or cloud deployments.
CyberArk Endpoint Privilege Manager's high pricing is justified by its quality, features, and appeal to large enterprises in finance.
Enterprise users value ThreatLocker Zero Trust Platform for its competitive pricing, comprehensive features, and enhanced scalability, enabling strategic budget allocation.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
Consultant at a tech services company with 1,001-5,000 employees
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Senior Process Expert at A.P. Moller - Maersk
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
Cyber Security Manager at Welab bank
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
Cybersecurity Manager at a consultancy with 10,001+ employees
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
Lead Consultant at a tech vendor with 501-1,000 employees
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
Manager at a computer software company with 1,001-5,000 employees
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
Director, Managed Services at a consultancy with 11-50 employees
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
Supervisor, Client Security at a consultancy with 11-50 employees
Money is saved because it is not costly, and I would suggest it for other companies.
Helpdesk Engineer at Computer Network Infrastructure (CNI) Consultants
 

Valuable Features

Cortex XDR offers AI-driven security, seamless integration, and automation, enhancing threat detection and risk reduction for networks.
CyberArk Endpoint Privilege Manager enhances security by managing privileges, integrating seamlessly, and preventing ransomware while ensuring regulatory compliance.
ThreatLocker Zero Trust Platform enhances security and efficiency with application control, ringfencing, admin access management, and unified auditing.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
Cyber Security Manager at Welab bank
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
Pre Sales Architect at network techlab
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Final Year Student at Gitam University
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
Security Delivery Analyst at Accenture
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
Head of Sales Services Department at a comms service provider with 51-200 employees
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
Cybersecurity Manager at a consultancy with 10,001+ employees
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
Cyber Security Specialist at Bremmar Consulting
It protects our customers.
CTO at Zettabytes
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
Tier 1 IT Engineer at a retailer with 11-50 employees
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Ransomware Protection
2nd
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
107
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), AI-Powered Cybersecurity Platforms (2nd)
CyberArk Endpoint Privilege...
Ranking in Ransomware Protection
5th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (4th), Anti-Malware Tools (5th), Application Control (3rd)
ThreatLocker Zero Trust Pla...
Ranking in Ransomware Protection
1st
Average Rating
9.2
Reviews Sentiment
7.1
Number of Reviews
74
Ranking in other categories
Network Access Control (NAC) (4th), Endpoint Protection Platform (EPP) (6th), Advanced Threat Protection (ATP) (7th), Application Control (1st), ZTNA (4th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
PH
Manager at a computer software company with 1,001-5,000 employees
MFA boosts protection and has blocking capabilities but dependency on other solutions complicates deployment
The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks. The agent may have problems syncing, which complicates deployment, especially when users leave the organization, however, agents remain licensed since the server still maintains licenses. Additionally, compared to other endpoint managers like Thycotic, CyberArk Endpoint Privilege Manager lacks recording capabilities, which limits its functionality for critical applications. A feature that records activity, even when bypassing CyberArk Endpoint Privilege Manager, would be beneficial.
Santo Joy - PeerSpot reviewer
Head Of Cyber Security at a outsourcing company with 201-500 employees
Security controls have been strengthened with granular application, ringfencing, and access policies
The features of ThreatLocker Zero Trust Endpoint Protection Platform that I like the most are the Ringfencing, elevation control, storage control, and application whitelisting functionality. For examples of how these features benefit my company, we were looking for a solution across various vendors to actually implement application whitelisting controls. ThreatLocker's agent, which is very lightweight and does not use much CPU or RAM, helped us achieve that solution. Ringfencing was an add-on that ticked off a lot of Australian framework security controls, which is the reason we chose it. My impression of the allowlisting feature in terms of managing which software, scripts, and libraries run on my devices is that ThreatLocker's community page has a lot of information around this, which is very helpful. Not only that, the Cyber Hero support that ThreatLocker provides gives us insights and best practices, helping us achieve that solution and guiding us to the right platform. The impact of Ringfencing on controlling the behavior of approved applications has been a big winner for us because it is something that many other platforms do not provide as a functionality. Having that allowed us to identify what applications talk to each other, which is something that many other platforms do not do. The network control feature impacts my ability to manage network traffic across my endpoints and servers. We have not used this widely across all our partners, but wherever required, we use it. It has been an easy solution for those customers to get that control implemented. The elevation feature's role in facilitating just-in-time administrative access for approved applications shows that elevation control helps in many use cases involving remote control platforms, door usage, and security system platforms that require local admins. There are many solutions that provide this functionality, but the licensing cost seems to be expensive, and it also adds another solution into the mix. Rather than doing that, we try to use ThreatLocker Zero Trust Endpoint Protection Platform to achieve that control. Regarding the storage control feature, I have used it. The primary function is USB blocking, which is very widely adopted, and also just locking down and allowing certain users to access certain file locations helps us there. When it comes to enforcing policy-driven access over various storage devices, it depends on the business risk adapted by the companies that we support, but generally the use case is USB and external storage devices where companies know that is a risk, but they do not have appropriate solutions. There are EDR platforms that claim to do this, but ThreatLocker Zero Trust Endpoint Protection Platform does it at an advanced level. My assessment of the efficiency of the real-time threat intelligence and category controls employed by Web Control in blocking malicious and non-compliant sites leads me to think that Web Control is another functionality within ThreatLocker Zero Trust Endpoint Protection Platform that is an add-on on top of the current set. That is another solution that we use based on what is required for the company, but again, that is not widely adapted yet for our partners.
report
Use our free recommendation engine to learn which Application Control solutions are best for your needs.
884,266 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
9%
Comms Service Provider
7%
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
9%
Government
7%
Computer Software Company
17%
Retailer
8%
Manufacturing Company
8%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business51
Midsize Enterprise13
Large Enterprise8
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no sh...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution...
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
My experience with pricing, setup cost, and licensing for ThreatLocker Zero Trust Endpoint Protection Platform is goo...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker Zero Trust Endpoint Protection Platform can be improved by providing admin rights that allow us to manag...
What is your primary use case for ThreatLocker Allowlisting?
My main use case for ThreatLocker Zero Trust Endpoint Protection Platform is to secure the server.A specific example ...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Viewfinity
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Information Not Available
Information Not Available
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. ThreatLocker Zero Trust Platform and other solutions. Updated: March 2026.
884,266 professionals have used our research since 2012.