We performed a comparison between GoodAccess and ThreatLocker Protect based on real PeerSpot user reviews.
Find out in this report how the two ZTNA solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."GoodAccess VPN has brought a transformative shift to our organization, notably enhancing collaboration and enabling seamless remote work."
"The task of managing security and auditing for unauthorized entries has been substantially diminished."
"The dashboard is pretty sleek and complete."
"Their user interface is intuitive as it is easy to navigate."
"This simple, stable, affordable VPN solution scaled with us over the first year of use, allowing for an expansion of remote/hybrid workers to remotely access key systems otherwise restricted to our internal office network."
"GoodAccess simplified our infrastructure and how we interact with clients."
"GoodAccess has significantly improved security in our organization."
"Static IP Addresses with multiple gateway options per team allow us to set up different teams with different network accesses."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"The sandbox functionality is fantastic."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"The installable app's occasional bugs have caused disruptions for some users, impacting smooth usage."
"This past year, I did not like having to purchase an upgrade to a plan with a minimum number of seats to get the features we needed. We do not use all of the seats."
"Enhancing the user interface and experience could make it more intuitive for all users."
"There is one minor drawback to mention: occasionally, the Internet connection tends to slow down noticeably while using the VPN."
"It would be useful to see the weekly usage information within the program itself and a dashboard for all usage data."
"The logs do not go back very far."
"The interface information could show more information about how threats have occurred. Right now, it only shows basic threat information."
"It is worth mentioning that we do experience disconnects on rare occasions."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"We identified several areas that we would like to see improved."
"There are some times when applications get submitted, the hashes don't really line up."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"Adding applications to the allowlist can sometimes feel overwhelming."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"The reporting could be improved."
GoodAccess is ranked 7th in ZTNA with 19 reviews while ThreatLocker Protect is ranked 9th in ZTNA with 13 reviews. GoodAccess is rated 9.2, while ThreatLocker Protect is rated 9.2. The top reviewer of GoodAccess writes "Robust, allows for remote work, and has comprehensive support". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". GoodAccess is most compared with , whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security. See our GoodAccess vs. ThreatLocker Protect report.
See our list of best ZTNA vendors.
We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.