Google Cloud Platform Cloud Identity-Aware Proxy vs ThreatLocker Protect comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Google Cloud Platform Cloud Identity-Aware Proxy and ThreatLocker Protect based on real PeerSpot user reviews.

Find out in this report how the two ZTNA solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Google Cloud Platform Cloud Identity-Aware Proxy vs. ThreatLocker Protect Report (Updated: March 2024).
770,141 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The solution is very easy to use. It's easy to navigate and to work with.""It is a stable solution.""The solution has many features for stability and security.""The product’s valuable feature is the ability to add a large number of users.""Scalability-wise, it is an easy solution to scale up. I rate the solution's scalability a ten out of ten.""Google Cloud Platform Cloud Identity-Aware Proxy provides more control of our assets because normally when you're using Google Cloud, you have to use your Google email. IAP can control the assets that only come from the dedicated company or IP address.""There is a certain accessibility feature that I can set using a cloud identity, which is really valuable to us.""I find the GCS Portal to be particularly valuable. It is more user-friendly and easier to navigate compared to other cloud providers, such as AWS. I particularly appreciate the user interface of GCS."

More Google Cloud Platform Cloud Identity-Aware Proxy Pros →

"Every single feature has been invaluable.""The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself.""The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds.""Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it.""While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist.""The interface is clean and well-organized, making it simple to navigate and find what we need.""The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines.""The sandbox functionality is fantastic."

More ThreatLocker Protect Pros →

Cons
"The initial setup was quite complex.""The cost of licenses could be better.""The solution is quite expensive.""Google Cloud Platform Cloud Identity-Aware Proxy could be more user-friendly and less expensive.""Google Cloud Platform Cloud Identity-Aware Proxy has certain limitations as a document or file management system, especially for non-workspace accounts. Manual management is required for most actions, and group management can be challenging. The process of managing permissions individually is time-consuming and not very efficient. For education purposes, the collaboration tools for working on files, assignments, and groups need improvement. The existing tools are inadequate and can be difficult to work with. Additionally, the grading books for teachers are not very useful and require improvement.""The solution should be more user-friendly and should have descriptive manuals on the page website.""We have some challenges related to purging the data. We get a lot of data on a daily basis that has to be refreshed on the site, but we are seeing some challenges with that. They can also include some third-party integration. We have one Akamai dependency. If they can come up with some API to talk to Akamai, it would be good.""The solution should have better integration."

More Google Cloud Platform Cloud Identity-Aware Proxy Cons →

"Adding applications to the allowlist can sometimes feel overwhelming.""We identified several areas that we would like to see improved.""ThreatLocker Allowlisting needs to improve its user interface and overall workflow.""The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.""There are some times when applications get submitted, the hashes don't really line up.""From a reporting perspective, enhancing the ability to customize reports would be beneficial.""If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out.""One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."

More ThreatLocker Protect Cons →

Pricing and Cost Advice
  • "I think that the cost is metered based on the data, but I don't have the details."
  • "Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us."
  • "The customer purchases an annually sponsored license."
  • "I think the price of Google Cloud Platform is reasonable. However, Microsoft is the most cost-effective solution for us because of Azure's integration. And we already have licenses for Windows Server and the databases, so the price is attractive."
  • "When comparing the price of GCP to other solutions it provides more value for the money."
  • "The licensing costs us $100,000 so pricing could be better."
  • "It is expensive to scale up the solution."
  • "The solution is inexpensive for personal use."
  • More Google Cloud Platform Cloud Identity-Aware Proxy Pricing and Cost Advice →

  • "Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
  • "Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
  • "The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
  • "The pricing works fine for me. It's very reasonably priced."
  • "The pricing is fair and there is no hard sell."
  • "The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
  • "I find ThreatLocker's pricing to be reasonable for the services it provides."
  • "I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
  • More ThreatLocker Protect Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
    770,141 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:I can access the information whenever I want. It's integration is easy. The tool's GUI is easy to use with an IT background. The value benefits of using it include the ability to avoid storing data on… more »
    Top Answer:I use the tool for servers. I don't think I have paid anything to personally use the tool. In general, I can say that I use a free tool. I don't think that cost is an issue. I don't pay for the… more »
    Top Answer:People who don't have experience in IT may find the tool challenging. It needs to improve its pricing.
    Top Answer:The interface is clean and well-organized, making it simple to navigate and find what we need.
    Top Answer:ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program itself, and everything related to it being top-notch. If my CTO ever suggested… more »
    Top Answer:The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.
    Ranking
    6th
    out of 34 in ZTNA
    Views
    199
    Comparisons
    129
    Reviews
    33
    Average Words per Review
    334
    Rating
    8.4
    9th
    out of 34 in ZTNA
    Views
    30
    Comparisons
    26
    Reviews
    9
    Average Words per Review
    1,919
    Rating
    9.1
    Comparisons
    Also Known As
    GCP Cloud IAP, Google Cloud Platform Cloud IAP, Cloud Identity-Aware Proxy
    ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
    Learn More
    Overview

    Google’s mission is to organize the world‘s information and make it universally accessible and useful.

    Since our founding in 1998, Google has grown by leaps and bounds. From offering search in a single language we now offer dozens of products and services—including various forms of advertising and web applications for all kinds of tasks—in scores of languages. And starting from two computer science students in a university dorm room, we now have thousands of employees and offices around the world. A lot has changed since the first Google search engine appeared. But some things haven’t changed: our dedication to our users and our belief in the possibilities of the Internet itself.

    The ThreatLocker platform is a robust Zero Trust endpoint security solution, safeguarding organizations against ransomware, malware, and various cyber threats through a unified approach. It incorporates key features like Application Allowlisting, Ringfencing, and Dynamic Network Control. Application Allowlisting ensures that only authorized applications run on endpoints, preventing unauthorized software and thwarting ransomware and malware threats. Ringfencing isolates approved applications from one another and the operating system, inhibiting malware spread and unauthorized access to sensitive data. Dynamic Network Control regulates traffic, enhancing security by closing unused ports and opening them as needed for authorized connections. The ThreatLocker platform simplifies security management with a centralized console and supports Windows, macOS, and Linux endpoints. 

    Top Industries
    REVIEWERS
    Financial Services Firm31%
    Retailer17%
    Computer Software Company14%
    Media Company7%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Financial Services Firm12%
    Comms Service Provider9%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Computer Software Company39%
    Retailer6%
    Government5%
    Healthcare Company5%
    Company Size
    REVIEWERS
    Small Business33%
    Midsize Enterprise24%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise15%
    Large Enterprise58%
    REVIEWERS
    Small Business93%
    Midsize Enterprise7%
    VISITORS READING REVIEWS
    Small Business56%
    Midsize Enterprise12%
    Large Enterprise31%
    Buyer's Guide
    Google Cloud Platform Cloud Identity-Aware Proxy vs. ThreatLocker Protect
    March 2024
    Find out what your peers are saying about Google Cloud Platform Cloud Identity-Aware Proxy vs. ThreatLocker Protect and other solutions. Updated: March 2024.
    770,141 professionals have used our research since 2012.

    Google Cloud Platform Cloud Identity-Aware Proxy is ranked 6th in ZTNA with 44 reviews while ThreatLocker Protect is ranked 9th in ZTNA with 13 reviews. Google Cloud Platform Cloud Identity-Aware Proxy is rated 8.4, while ThreatLocker Protect is rated 9.2. The top reviewer of Google Cloud Platform Cloud Identity-Aware Proxy writes "User-friendly, easy to navigate, and intuitive interface". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". Google Cloud Platform Cloud Identity-Aware Proxy is most compared with Cloudflare Access, Okta Workforce Identity, Zscaler Zero Trust Exchange, Cato SASE Cloud Platform and Cisco Duo, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security. See our Google Cloud Platform Cloud Identity-Aware Proxy vs. ThreatLocker Protect report.

    See our list of best ZTNA vendors.

    We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.