Try our new research platform with insights from 80,000+ expert users

Heimdal Endpoint Security vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Protection Platform (EPP)
5th
Ranking in Ransomware Protection
2nd
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
106
Ranking in other categories
Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), AI-Powered Cybersecurity Platforms (2nd)
Heimdal Endpoint Security
Ranking in Endpoint Protection Platform (EPP)
40th
Ranking in Ransomware Protection
12th
Average Rating
9.0
Reviews Sentiment
8.6
Number of Reviews
1
Ranking in other categories
Anti-Malware Tools (27th), Threat Intelligence Platforms (TIP) (25th), Endpoint Detection and Response (EDR) (37th), Domain Name System (DNS) Security (12th)
ThreatLocker Zero Trust End...
Ranking in Endpoint Protection Platform (EPP)
6th
Ranking in Ransomware Protection
1st
Average Rating
9.2
Reviews Sentiment
7.1
Number of Reviews
72
Ranking in other categories
Network Access Control (NAC) (4th), Advanced Threat Protection (ATP) (7th), Application Control (1st), ZTNA (4th)
 

Mindshare comparison

As of March 2026, in the Endpoint Protection Platform (EPP) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.5%, down from 4.0% compared to the previous year. The mindshare of Heimdal Endpoint Security is 0.5%, up from 0.2% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 1.2%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.5%
ThreatLocker Zero Trust Endpoint Protection Platform1.2%
Heimdal Endpoint Security0.5%
Other94.8%
Endpoint Protection Platform (EPP)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
DEEPAK KUMAR PACHDEO DUBEY - PeerSpot reviewer
Senior IT Support Specialist at PXGEO
Delivers efficiency and agility with USB control limitations
One area where we lag is that, since we use everything from Heimdal, including XDR and other features, we also use the privilege manager feature called Elevation. What we lack is granular USB control. We have an issue where we can only switch USB on or off. I want to whitelist specific devices in the network, which I currently cannot do.
Santo Joy - PeerSpot reviewer
Head Of Cyber Security at a outsourcing company with 201-500 employees
Security controls have been strengthened with granular application, ringfencing, and access policies
The features of ThreatLocker Zero Trust Endpoint Protection Platform that I like the most are the Ringfencing, elevation control, storage control, and application whitelisting functionality. For examples of how these features benefit my company, we were looking for a solution across various vendors to actually implement application whitelisting controls. ThreatLocker's agent, which is very lightweight and does not use much CPU or RAM, helped us achieve that solution. Ringfencing was an add-on that ticked off a lot of Australian framework security controls, which is the reason we chose it. My impression of the allowlisting feature in terms of managing which software, scripts, and libraries run on my devices is that ThreatLocker's community page has a lot of information around this, which is very helpful. Not only that, the Cyber Hero support that ThreatLocker provides gives us insights and best practices, helping us achieve that solution and guiding us to the right platform. The impact of Ringfencing on controlling the behavior of approved applications has been a big winner for us because it is something that many other platforms do not provide as a functionality. Having that allowed us to identify what applications talk to each other, which is something that many other platforms do not do. The network control feature impacts my ability to manage network traffic across my endpoints and servers. We have not used this widely across all our partners, but wherever required, we use it. It has been an easy solution for those customers to get that control implemented. The elevation feature's role in facilitating just-in-time administrative access for approved applications shows that elevation control helps in many use cases involving remote control platforms, door usage, and security system platforms that require local admins. There are many solutions that provide this functionality, but the licensing cost seems to be expensive, and it also adds another solution into the mix. Rather than doing that, we try to use ThreatLocker Zero Trust Endpoint Protection Platform to achieve that control. Regarding the storage control feature, I have used it. The primary function is USB blocking, which is very widely adopted, and also just locking down and allowing certain users to access certain file locations helps us there. When it comes to enforcing policy-driven access over various storage devices, it depends on the business risk adapted by the companies that we support, but generally the use case is USB and external storage devices where companies know that is a risk, but they do not have appropriate solutions. There are EDR platforms that claim to do this, but ThreatLocker Zero Trust Endpoint Protection Platform does it at an advanced level. My assessment of the efficiency of the real-time threat intelligence and category controls employed by Web Control in blocking malicious and non-compliant sites leads me to think that Web Control is another functionality within ThreatLocker Zero Trust Endpoint Protection Platform that is an add-on on top of the current set. That is another solution that we use based on what is required for the company, but again, that is not widely adapted yet for our partners.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is that you can select remote access of any machine for sandboxing."
"The ability to kind of stitch everything together and see the actual complete picture is very useful. I guess you'd call it a playbook. Some people call it the forensics analysis of what was happening on particular endpoints when they detected some malicious behavior, and what transpired before that to cause that. It is also very user friendly. The way they have done everything and integrated all the solutions that they've purchased over the years to make it a very seamless, effective product is very good. One thing about Palo Alto is that they take the products or services that they purchase and make them seamless for the end user as compared to some companies that purchase other companies and then just kind of have their products off to the side or keep different interfaces. Palo Alto doesn't do that."
"My advice for others looking into using Cortex is that it is very easy to use and very useful for the customer environment, whether it's a public or private one."
"The solution allows us to gain remote access without the user's knowledge and take the necessary actions on the device."
"Implementing Cortex XDR by Palo Alto Networks has had a significant impact on my security analyst workload because it becomes much easier."
"The most valuable aspect of Cortex XDR by Palo Alto Networks for me is its integration with AI detection, where we get to know the behavioral detection based on users, traffic patterns, and different services that we consume."
"Its ability to react to cyber data attacks is awesome. That is pretty much the use of it. What blows your mind is the ability to access your assets remotely and see what is actually going on with them. You can not only see them in a console. You can also react very rapidly to your assets that are compromised."
"It is easy to use."
"Heimdal is a very agile and lightweight solution."
"As compared to multiple solutions I have used in the past, Heimdal is a very agile and lightweight solution."
"The application management on any workstation with the solution is valuable. I find it valuable that it indicates whether the software is part of our pre-approved list, adding a nice layer of protection. It works great because people cannot just install or download any app from the web."
"ThreatLocker Zero Trust Endpoint Protection Platform benefits our company because we can be secure while remaining relaxed, as we are only expecting normal behavior and nothing unusual."
"The biggest one that we focus on is the application control with ringfencing. That combination is very beneficial."
"Ringfencing is a valuable feature."
"Being able to protect and trust nothing by default, known as zero trust, is the most important feature to me."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"The sandbox functionality is fantastic."
"I really enjoy ringfencing and elevation features. It makes my life easier because I do not have to get on a computer to elevate a prompt to allow users to run something they run every day as an admin."
 

Cons

"There are a large number of false positives."
"I don't like that they have different types of licenses. For example, if users select a license, they think they will have all the platforms they need to improve their network or security. But after some time, Palo Alto Networks changed their licensing, and some of the features that, for example, were free at the beginning now have a cost. I think the integration can be improved. For example, a lot of tools are just integrated through APIs."
"Being able to filter the events to see those that are related to the actual alert would save time spent by the engineer."
"The dashboard is the area that needs to improve so that we can have the ability to drill down without having to go elsewhere to verify results."
"Impact on system performance is horrible, adding a lot of delays for users."
"Cortex XDR by Palo Alto Networks can improve mobile integration to allow access to the console."
"In terms of areas of improvement, we have not completed our review of the product. We're also looking at other products. So, it's a little bit hard to tell what could be different because we have not completed the review of this product, but based on our experience so far, its implementation is quite complex."
"The server sometimes stops continuously to check things so it would be helpful to receive access updates or technical reasons."
"What we lack is granular USB control. We have an issue where we can only switch USB on or off."
"What we lack is granular USB control."
"There are some programs that, when they update, they hit other folders; it would be nice to be able to see where that application is pointing when it wants to update, especially if it's updating in the AppData folder or C Windows folder since it might be the same application already whitelisted, but it changes around."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"There could be options for handling a bulk amount of machines simultaneously."
"Identifying which security and configuration settings need fixing using the DAC dashboard is somewhat difficult at times."
"ThreatLocker Zero Trust Endpoint Protection Platform can be improved by providing admin rights that allow us to manage it from the server by providing some token IDs or any kind of OTP if someone has rights and is on leave."
"To become the best solution, some sort of integration or remote management, like remotely connecting, could be beneficial."
"I actually have a gripe with the allowlisting feature of ThreatLocker Zero Trust Endpoint Protection Platform."
"I have not seen a return on investment yet, but there is a small amount of time saved because of fewer dashboards."
 

Pricing and Cost Advice

"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"When we first bought it, it was a bit expensive, but it was worth it. The licensing was straightforward."
"Cortex XDR by Palo Alto Networks is quite an expensive solution."
"I don't recall what the cost was, but it wasn't really that expensive."
"Cortex XDR’s pricing is very reasonable."
"The price is on the higher side, but it's okay."
"Licensing for Palo Alto Networks Cortex XDR can be costly, especially when it comes to a hundred users. A license is required for each user, and the subscription must be renewed on a yearly basis."
"It is "expensive" and flexible."
Information not available
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"I do not know about the licensing and price as it comes bundled from our MSP. However, it seems fairly reasonable for us, which is why we chose it."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"I do not deal with pricing, but I assume it is cost-effective for us. We choose a solution based on functionality and affordability."
"The pricing is pretty fair, considering other solutions. Licensing-wise, it did not take long."
"So far, it has been great. I have no complaints. Of course, everybody wishes it was cheaper."
"The pricing is fair and there is no hard sell."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
883,712 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
9%
Comms Service Provider
7%
Computer Software Company
15%
Comms Service Provider
10%
Non Profit
7%
Media Company
7%
Computer Software Company
17%
Retailer
8%
Manufacturing Company
8%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
No data available
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise12
Large Enterprise8
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What is your experience regarding pricing and costs for Heimdal Endpoint Security?
Pricing, compared to what we had before, was quite economical. There was a difference of about twenty percent or some...
What needs improvement with Heimdal Endpoint Security?
One area where we lag is that, since we use everything from Heimdal, including XDR and other features, we also use th...
What is your primary use case for Heimdal Endpoint Security?
My company colleagues and I use this antivirus solution. I am part of a company where I deploy solutions, and I also ...
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
Pricing, setup costs, and licensing have been pretty accessible and manageable. It was not too expensive to get start...
What needs improvement with ThreatLocker Allowlisting?
Going with the theme of ThreatLocker Zero Trust Endpoint Protection Platform being a one-stop shop where they have ju...
What is your primary use case for ThreatLocker Allowlisting?
We're a managed service provider, mostly dealing with small business office environments, so ThreatLocker Zero Trust ...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Heimdal Next-Gent Endpoint Antivirus, Thor Vigilance Enterprise, Heimdal Endpoint Detection and Response, Heimdal DNS Security - Endpoint, Heimdal Threat Prevention, Heimdal Ransomware Encryption Protection
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Brother, Symbion, CPH West
Information Not Available
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: February 2026.
883,712 professionals have used our research since 2012.