GoodAccess vs ThreatLocker Protect comparison

Cancel
You must select at least 2 products to compare!
GoodAccess Logo
141 views|16 comparisons
96% willing to recommend
ThreatLocker Logo
30 views|26 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between GoodAccess and ThreatLocker Protect based on real PeerSpot user reviews.

Find out in this report how the two ZTNA solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed GoodAccess vs. ThreatLocker Protect Report (Updated: March 2024).
770,141 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"GoodAccess VPN has brought a transformative shift to our organization, notably enhancing collaboration and enabling seamless remote work.""The task of managing security and auditing for unauthorized entries has been substantially diminished.""The dashboard is pretty sleek and complete.""Their user interface is intuitive as it is easy to navigate.""This simple, stable, affordable VPN solution scaled with us over the first year of use, allowing for an expansion of remote/hybrid workers to remotely access key systems otherwise restricted to our internal office network.""GoodAccess simplified our infrastructure and how we interact with clients.""GoodAccess has significantly improved security in our organization.""Static IP Addresses with multiple gateway options per team allow us to set up different teams with different network accesses."

More GoodAccess Pros →

"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running.""The sandbox functionality is fantastic.""The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself.""The interface is clean and well-organized, making it simple to navigate and find what we need.""While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist.""The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network.""Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it.""Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."

More ThreatLocker Protect Pros →

Cons
"The installable app's occasional bugs have caused disruptions for some users, impacting smooth usage.""This past year, I did not like having to purchase an upgrade to a plan with a minimum number of seats to get the features we needed. We do not use all of the seats.""Enhancing the user interface and experience could make it more intuitive for all users.""There is one minor drawback to mention: occasionally, the Internet connection tends to slow down noticeably while using the VPN.""It would be useful to see the weekly usage information within the program itself and a dashboard for all usage data.""The logs do not go back very far.""The interface information could show more information about how threats have occurred. Right now, it only shows basic threat information.""It is worth mentioning that we do experience disconnects on rare occasions."

More GoodAccess Cons →

"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software.""We identified several areas that we would like to see improved.""There are some times when applications get submitted, the hashes don't really line up.""The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.""If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out.""Adding applications to the allowlist can sometimes feel overwhelming.""One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system.""The reporting could be improved."

More ThreatLocker Protect Cons →

Pricing and Cost Advice
Information Not Available
  • "Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
  • "Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
  • "The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
  • "The pricing works fine for me. It's very reasonably priced."
  • "The pricing is fair and there is no hard sell."
  • "The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
  • "I find ThreatLocker's pricing to be reasonable for the services it provides."
  • "I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
  • More ThreatLocker Protect Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
    770,141 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:GoodAccess offers a very available professional support service - it can be via chat service, email, or phone.
    Top Answer:Don't judge a service by its cost. A good service may cost more, however, it is worth it.
    Top Answer:They need to provide a more comprehensive app that shows more data that appears on the GoodAccess site.
    Top Answer:The interface is clean and well-organized, making it simple to navigate and find what we need.
    Top Answer:ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program itself, and everything related to it being top-notch. If my CTO ever suggested… more »
    Top Answer:The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.
    Ranking
    7th
    out of 34 in ZTNA
    Views
    141
    Comparisons
    16
    Reviews
    19
    Average Words per Review
    576
    Rating
    9.3
    9th
    out of 34 in ZTNA
    Views
    30
    Comparisons
    26
    Reviews
    9
    Average Words per Review
    1,919
    Rating
    9.1
    Comparisons
    Also Known As
    ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
    Learn More
    Overview

    GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.
    GoodAccess is the world's simplest SaaS for enabling zero-trust access to your business network. Tailored to meet SMB's needs, it allows you to mitigate the risks introduced by remote workforce, BYOD and distributed IT resources with no hassle.

    The ThreatLocker platform is a robust Zero Trust endpoint security solution, safeguarding organizations against ransomware, malware, and various cyber threats through a unified approach. It incorporates key features like Application Allowlisting, Ringfencing, and Dynamic Network Control. Application Allowlisting ensures that only authorized applications run on endpoints, preventing unauthorized software and thwarting ransomware and malware threats. Ringfencing isolates approved applications from one another and the operating system, inhibiting malware spread and unauthorized access to sensitive data. Dynamic Network Control regulates traffic, enhancing security by closing unused ports and opening them as needed for authorized connections. The ThreatLocker platform simplifies security management with a centralized console and supports Windows, macOS, and Linux endpoints. 

    Top Industries
    REVIEWERS
    Computer Software Company27%
    Healthcare Company18%
    Media Company18%
    Marketing Services Firm18%
    VISITORS READING REVIEWS
    Computer Software Company39%
    Retailer6%
    Government5%
    Healthcare Company5%
    Company Size
    REVIEWERS
    Small Business77%
    Midsize Enterprise18%
    Large Enterprise5%
    REVIEWERS
    Small Business93%
    Midsize Enterprise7%
    VISITORS READING REVIEWS
    Small Business56%
    Midsize Enterprise12%
    Large Enterprise31%
    Buyer's Guide
    GoodAccess vs. ThreatLocker Protect
    March 2024
    Find out what your peers are saying about GoodAccess vs. ThreatLocker Protect and other solutions. Updated: March 2024.
    770,141 professionals have used our research since 2012.

    GoodAccess is ranked 7th in ZTNA with 19 reviews while ThreatLocker Protect is ranked 9th in ZTNA with 13 reviews. GoodAccess is rated 9.2, while ThreatLocker Protect is rated 9.2. The top reviewer of GoodAccess writes "Robust, allows for remote work, and has comprehensive support". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". GoodAccess is most compared with , whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security. See our GoodAccess vs. ThreatLocker Protect report.

    See our list of best ZTNA vendors.

    We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.