ExtremeControl vs ThreatLocker Protect comparison

Cancel
You must select at least 2 products to compare!
Extreme Logo
1,017 views|822 comparisons
83% willing to recommend
ThreatLocker Logo
89 views|69 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between ExtremeControl and ThreatLocker Protect based on real PeerSpot user reviews.

Find out in this report how the two Network Access Control (NAC) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed ExtremeControl vs. ThreatLocker Protect Report (Updated: May 2024).
771,170 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"I can know which end users are using which features.""The solution is easy to use.""There is information on migrating most of the cloud system's features.""It has effectively enhanced network security and integrated with other security tools to streamline operations.""The company also uses Cisco ISE in other places. I have been told that ExtremeControl is easier to use than ISE. The other reason we prefer ExtremeControl is stability. That's why they chose it for this big hospital in Oslo."

More ExtremeControl Pros →

"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product.""We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running.""Every single feature has been invaluable.""The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network.""ThreatLocker Allowlisting has all of these features integrated into one console, making it effective.""The interface is clean and well-organized, making it simple to navigate and find what we need.""The sandbox functionality is fantastic.""The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."

More ThreatLocker Protect Pros →

Cons
"One improvement could be better clarification, namely that the system only works optimally with all components purchased together.""The installation is easy, it can take between five minutes to four hours depending on the complexity of the environment. The speed of the installation could improve for more complex environments.""I'd like to have access to more information on the traffic passing through.""There isn't enough development for the on-premises controller."

More ExtremeControl Cons →

"The reporting could be improved.""From a reporting perspective, enhancing the ability to customize reports would be beneficial.""Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats.""We identified several areas that we would like to see improved.""One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system.""The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.""There are some times when applications get submitted, the hashes don't really line up.""Adding applications to the allowlist can sometimes feel overwhelming."

More ThreatLocker Protect Cons →

Pricing and Cost Advice
  • "ExtremeControl can be expensive compared to other options in the market."
  • More ExtremeControl Pricing and Cost Advice →

  • "Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
  • "Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
  • "The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
  • "The pricing works fine for me. It's very reasonably priced."
  • "The pricing is fair and there is no hard sell."
  • "The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
  • "I find ThreatLocker's pricing to be reasonable for the services it provides."
  • "I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
  • More ThreatLocker Protect Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Network Access Control (NAC) solutions are best for your needs.
    771,170 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It has effectively enhanced network security and integrated with other security tools to streamline operations.
    Top Answer:One improvement could be better clarification, namely that the system only works optimally with all components purchased together.
    Top Answer:We don't like ExtremeControl on-premises because it's missing most features. There is information on migrating most of the cloud system's features, but there isn't enough development for the… more »
    Top Answer:The interface is clean and well-organized, making it simple to navigate and find what we need.
    Top Answer:ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program itself, and everything related to it being top-notch. If my CTO ever suggested… more »
    Top Answer:The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.
    Ranking
    Views
    1,017
    Comparisons
    822
    Reviews
    2
    Average Words per Review
    348
    Rating
    7.0
    Views
    89
    Comparisons
    69
    Reviews
    9
    Average Words per Review
    1,919
    Rating
    9.1
    Comparisons
    Also Known As
    Extreme Access Control, Enterasys NAC
    ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
    Learn More
    Overview
    ExtremeControl lets you manage secure and automated access for both, BYOD and IoT devices from one convenient dashboard. It makes it easy to roll out granular policies across your wired and wireless networks to meet industry and company compliance obligations. Identity based network access control keeps unauthorized people and devices from accessing your network.

    The ThreatLocker platform is a robust Zero Trust endpoint security solution, safeguarding organizations against ransomware, malware, and various cyber threats through a unified approach. It incorporates key features like Application Allowlisting, Ringfencing, and Dynamic Network Control. Application Allowlisting ensures that only authorized applications run on endpoints, preventing unauthorized software and thwarting ransomware and malware threats. Ringfencing isolates approved applications from one another and the operating system, inhibiting malware spread and unauthorized access to sensitive data. Dynamic Network Control regulates traffic, enhancing security by closing unused ports and opening them as needed for authorized connections. The ThreatLocker platform simplifies security management with a centralized console and supports Windows, macOS, and Linux endpoints. 

    Sample Customers
    Street Crane, Robert Bosch, Molex Chengdu, Weir Valves & Controls UK, Renault, AESSEAL, Ducati, Alexander Dennis, UK Ministry of Defence, Manz
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company16%
    Government10%
    Healthcare Company9%
    Educational Organization8%
    VISITORS READING REVIEWS
    Computer Software Company39%
    Retailer6%
    Government6%
    Healthcare Company5%
    Company Size
    VISITORS READING REVIEWS
    Small Business28%
    Midsize Enterprise18%
    Large Enterprise54%
    REVIEWERS
    Small Business93%
    Midsize Enterprise7%
    VISITORS READING REVIEWS
    Small Business57%
    Midsize Enterprise12%
    Large Enterprise31%
    Buyer's Guide
    ExtremeControl vs. ThreatLocker Protect
    May 2024
    Find out what your peers are saying about ExtremeControl vs. ThreatLocker Protect and other solutions. Updated: May 2024.
    771,170 professionals have used our research since 2012.

    ExtremeControl is ranked 14th in Network Access Control (NAC) with 5 reviews while ThreatLocker Protect is ranked 6th in Network Access Control (NAC) with 13 reviews. ExtremeControl is rated 7.2, while ThreatLocker Protect is rated 9.2. The top reviewer of ExtremeControl writes "Has a simple setup process, but it could be affordable ". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". ExtremeControl is most compared with Aruba ClearPass, Cisco ISE (Identity Services Engine), Fortinet FortiNAC, Forescout Platform and Sophos Network Access Control, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security. See our ExtremeControl vs. ThreatLocker Protect report.

    See our list of best Network Access Control (NAC) vendors.

    We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.