Try our new research platform with insights from 80,000+ expert users

Huntress Managed ITDR vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Huntress Managed ITDR
Average Rating
10.0
Reviews Sentiment
8.8
Number of Reviews
3
Ranking in other categories
Identity Threat Detection and Response (ITDR) (11th)
ThreatLocker Zero Trust End...
Average Rating
9.2
Reviews Sentiment
7.5
Number of Reviews
39
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (7th), Advanced Threat Protection (ATP) (6th), Application Control (1st), ZTNA (3rd), Ransomware Protection (1st)
 

Featured Reviews

Kevin - PeerSpot reviewer
Peace of mind in identifying compromises in your M365 tenants
Huntress Managed ITDR examines various signals from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action. It's a comprehensive solution covering endpoints and cloud tenants, offering peace of mind. I recognized its benefits immediately, as it provides protection against M365 identity compromises, like admin account breaches.
Johnathan Bodily - PeerSpot reviewer
Ensures ransomware protection and reduces phishing chaos
The application control has been great so far, and while I am still exploring the network access controls, I unfortunately don't have access to one module I would love to have due to licensing restrictions. It's easy to use in regard to reducing attack surfaces. For me, it's a piece of cake. We can have something approved within 30 seconds, thanks to the mobile app. We haven't eliminated security solutions. We just add to it, and ThreatLocker has been a great addition. We also have Kaseya and ThreatLocker as a supplement to that. It's useful. They have overlap, and we look at the overlap as a good thing. It's helped your organization save on operational costs or expenses by ensuring that many fewer hours are spent dealing with ransomware nonsense. I cannot count the amount of hours that I personally have not had to put in to recovering an environment from a ransomware event. The last big one took us about three weeks to completely recover from. Since we've grouped ThreatLocker in, the management of that whole setup has gone down to just daily help desk tasks and general server maintenance instead of having the whole system on fire. There are probably thousands of hours of saved time between our teams. It's been great so far. ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications is great. It's my biggest protection, the blocked applications. In a lot of cases, you go to install something yourself that you need for management, and it comes in and says, nope. And then I have to log into the portal and approve it. I get our other guys saying, hey, why are you trying to approve something? Any of the tools that I'm using on a day-to-day basis that haven't been in the environment during the whole learning mode initially, I could go through and set extensions and all that. So, while it's a headache on that end, the amount of saved time I can't even count. It is a little frustrating on my end since I like to go as quickly as I possibly can, and it slows me down. However, that's a really good thing. Depending on the site, it can save a lot of time and cut down headaches. It's likely saved a week's worth of time. It's cut down the amount of sever help desk tickets. Those have become minimal.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The centralized management with the EDR and ITDR is beneficial."
"I rate the overall solution as a ten out of ten."
"Huntress Managed ITDR examines various nulls from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action."
"The initial setup was very easy."
"Implementing Huntress Managed ITDR has improved our business by allowing us to be more proactive with our security posture."
"Overall, everything is excellent, and everything is well-prepared, from the laptops provided to the overall setup."
"I would rate it a ten out of ten."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"A few years back, we had an attack on one of our biggest clients."
"The application management on any workstation with the solution is valuable. I find it valuable that it indicates whether the software is part of our pre-approved list, adding a nice layer of protection. It works great because people cannot just install or download any app from the web."
"ThreatLocker Zero Trust Endpoint Protection Platform provides no-sweat security that we can easily deploy."
"The pre-built policies and the fact that I get notified when a user requests an application are significant."
"Blocking is done comprehensively."
 

Cons

"If anything, it's created more work, but that's because we're now seeing things that we weren't seeing before."
"More in-depth reporting could be beneficial for the solution."
"More in-depth reporting could be beneficial for the solution."
"The product needs further maturity, with some improvements in the user interface."
"The product needs further maturity, with some improvements in the user interface."
"It is a little frustrating on my end since I like to go as quickly as I possibly can, and it slows me down."
"Their product is solid. I have a hard time complaining much about it because when we do find little things, they are usually interface-related or related to things that would be nice to have."
"Identifying areas of improvement is challenging, however, perhaps adding a few more built-ins could help."
"ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent."
"I have encountered some problems with stability, however, they are resolved quickly."
"Initially, the learning curve was slightly high for me, however, that has been resolved now."
"There could be options for handling a bulk amount of machines simultaneously."
"The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
 

Pricing and Cost Advice

Information not available
"The pricing is fair and there is no hard sell."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"We have encountered a few challenges regarding pricing, contract renewals, and additions. As we explored adding features like Cyber Hero, it proved to be an increased expense for our clients. This was primarily a mistake on our part due to how we initially priced it to clients."
"ThreatLocker's pricing seems justifiable."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"I do not deal with pricing, but I assume it is cost-effective for us. We choose a solution based on functionality and affordability."
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
862,077 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
20%
Insurance Company
15%
University
9%
Performing Arts
6%
Computer Software Company
34%
Retailer
8%
Manufacturing Company
6%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Huntress Managed ITDR?
More in-depth reporting could be beneficial for the solution.
What is your primary use case for Huntress Managed ITDR?
I use Huntress Managed ITDR for 365 protection, monitoring log run events, security, and abnormal logons.
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
Pricing, setup costs, and licensing have been pretty accessible and manageable. It was not too expensive to get started, especially at a small scale for a smaller MSP. It is very accessible, easy t...
What needs improvement with ThreatLocker Allowlisting?
For the space that it's in, it's already there. I don't know of another product that compares to its level. Even recently, with the addition of the detect module is a very nice add-on to the packet...
 

Also Known As

No data available
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: June 2025.
862,077 professionals have used our research since 2012.