We performed a comparison between Microsoft Defender Threat Intelligence and ThreatLocker Protect based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution blocks incoming threats on the local PC or any cloud-based threats."
"It is very scalable. There are approximately 2,000 endpoints and up to 200 servers in our company."
"You can use it to monitor third parties and ensure they are not under threat attacks. It is beneficial in the GRC model."
"The technical support services are excellent."
"The global review and remediation of malicious code is probably the most valuable feature."
"The solution is well integrated with other Microsoft security products."
"I value how Threat Intelligence integrates with the different platforms in Microsoft."
"The product's anti-spam and malware-scanning features are useful. We scan email attachments, documents, and malicious codes."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"The sandbox functionality is fantastic."
"We encounter problems connecting the product deployed on the user endpoints with the servers."
"It's a bit complicated to manage because you have many dependencies of servers, many dependencies in queue, and so on. Entries or different endpoints, and you make different configuration topics for each one. So that's a major problem."
"I would like to see more integration with other solutions. For example, integration well with Microsoft but not with other solutions."
"It takes time for the support team to understand the issue, and they then respond with a delay at times, which causes a lot of trouble."
"I would like to see more AI features and capabilities."
"One area where Microsoft Defender could be improved is in its support for non-Microsoft products, particularly for systems running Linux or other open-source platforms across ecosystems."
"The price point is something they can improve slightly for those who don't have an M 365 E5."
"The price of the solution is an area of concern where improvements are required. In general, the solution's price needs to be reduced."
"We identified several areas that we would like to see improved."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"Adding applications to the allowlist can sometimes feel overwhelming."
"The reporting could be improved."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"More visibility in the built-ins would be nice."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
More Microsoft Defender Threat Intelligence Pricing and Cost Advice →
Microsoft Defender Threat Intelligence is ranked 15th in Advanced Threat Protection (ATP) with 24 reviews while ThreatLocker Protect is ranked 16th in Advanced Threat Protection (ATP) with 13 reviews. Microsoft Defender Threat Intelligence is rated 8.4, while ThreatLocker Protect is rated 9.2. The top reviewer of Microsoft Defender Threat Intelligence writes "A tool that offers endpoint protection with low maintenance costs". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". Microsoft Defender Threat Intelligence is most compared with Microsoft Sentinel, STAXX, Cisco Threat Grid, ThreatConnect Threat Intelligence Platform (TIP) and VirusTotal, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security. See our Microsoft Defender Threat Intelligence vs. ThreatLocker Protect report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.