


Okta Platform and ThreatLocker compete in the realm of identity and access management solutions. While both offer robust security features, Okta Platform gains a competitive edge by streamlining user identity integration across diverse applications, enhancing workflow efficiencies significantly.
Features: Okta Platform emphasizes comprehensive identity and access management solutions, focusing on user-friendly integration with HR systems through Universal Directory and profile mapping. It also offers adaptive multi-factor authentication and smooth IT management. Conversely, ThreatLocker focuses on application control, employing a denial-by-default approach and leveraging unique features like Ring-Fencing to enhance endpoint security by precisely managing software execution and controlling unauthorized scripts and applications.
Room for Improvement: Okta Platform could improve its system log and analytics for thorough long-term analysis, without relying on exporting to external solutions. It also needs to address occasional downtimes, optimize user prompts, and simplify complex policy management. ThreatLocker could enhance its identity management features, improve web control components, and streamline the setup process for new users while increasing non-PC platform compatibility.
Ease of Deployment and Customer Service: Okta Platform offers diverse deployment options in public cloud environments, easing the setup for existing cloud infrastructures, and delivers reliable customer service, though response times vary. ThreatLocker Zero Trust Platform balances deployment across public and private clouds, prioritizing customization and a cost-effective strategy. Its support consistently rates high due to continuous onboarding assistance.
Pricing and ROI: Okta Platform's pricing, while competitive, especially benefits enterprises with volume discounts, providing value through automation and reduced reliance on separate identity management systems, driving ROI. ThreatLocker offers transparent, cost-effective licensing with integrated onboarding, avoiding large initial costs. Its ROI emerges from time-saving auditing features and enhanced infrastructure security.
With iboss, whenever you turn on your laptop, the iboss agent automatically connects to the iboss cloud, enforcing all security policies. So with respect to the security side, it strengthens measures.
I have seen some cost effectiveness from iboss; it has reduced certain support requirements, making it a more hands-off solution.
With Single Sign-On and automated identity management, employees can access applications faster while IT teams spend less time handling authentication issues.
Employee onboarding used to be a major pain point, but the automation Okta Platform provides for creating user accounts across various apps or SaaS tools has made our life much easier.
We have our dashboard to log in via Okta Workforce Identity.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
Based on what we use ThreatLocker Zero Trust Endpoint Protection Platform for with the same functionalities and packaging, it was around 13 or 14 hours.
We have the MDR package as well, and just knowing someone is watching those endpoints at 3:00 a.m. is a lifesaver that you cannot put a dollar figure on.
They are very fast, responsive, and knowledgeable.
The quality of the support is fantastic.
We had promising discussions about resolving these issues, but no real action followed.
By offering a system to set varying priority levels on support tickets, urgent issues could receive quicker attention, benefiting business continuity and customer satisfaction.
They are very supportive; they just open a ticket, and they support us very professionally.
We had an issue a couple of years ago that was swiftly resolved by the support team, showing their efficiency.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
They are also able to meet on-demand requirements based on your contract with them, and can easily provide adequate resources and scalability.
I would rate it a nine out of ten for scalability.
If I start seeing sluggishness or anything like that, I just reach out to my rep, and they connect with their dev team, typically resolving it the same day.
The scalability of Okta Platform is impressive, but its effectiveness relies on how integrations are designed, rate limits are handled, and day-to-day operations are managed.
It is secure, providing needed scalability without impacting performance.
Clients can scale their API access requests beyond default limits, which is adaptable according to requirements without impacting performance or deployment.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
ThreatLocker Zero Trust Endpoint Protection Platform scales very smoothly with our growing needs.
It's been pretty solid; I've never had an outage with them, and if I ever had, it's only been once out of the seven years.
We've experienced zero downtime.
Our biggest problem with their service was it did not recognize the device despite our ClearPass sending information to the iboss box.
This ensures immediate action upon changes applied within Okta Platform, stabilizing operations in managing user accounts, identities, logins, and user profiles.
Okta Workforce Identity is a stable product.
There are no doubts regarding the stability of Okta Customer Identity.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
It is not as intuitive as the rest of the platform.
We also had a problem with a transition when we upgraded from one appliance of theirs to another, but their engineer lost a good deal of our data.
Our iboss subscription access should be more secure with an OTP or VPN etc.
If there was a fingerprint option, then only the person who has already added their fingerprint on their mobile phone could access it.
Improvements could be made by simplifying integrations and providing more intuitive configuration options for administrators.
If someone is a beginner with Okta Platform, the UI should be simplified, and the language used should make it easier for them to understand the concepts and what they are trying to do.
Controlling the cloud environment, not just endpoints, is crucial.
ThreatLocker Zero Trust Endpoint Protection Platform could improve by being a little more hands-off, perhaps by having a team inside ThreatLocker that does all the vetting of patches; having one person hired by ThreatLocker to check out patches means that a million other industries using ThreatLocker Zero Trust Endpoint Protection Platform do not have to vet the same patch, ultimately saving time and money around the world.
This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.
It offers the same features you would get from a vendor that charges 250,000 British pounds for a fraction of the price.
The following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs.
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern.
Despite the cost, it's cheaper than the potential financial loss from a security breach.
It is certainly not cheap, but the features that you get, the functionality that you get, and whatever use cases that you have, it definitely satisfies those.
The pricing per-user list drops when user counts rise and with multi-year commitments.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
Money is saved because it is not costly, and I would suggest it for other companies.
The solution's mental health function can detect if someone needs help.
It's given us a lot more visibility into our computer assets that may be infected with viruses and also shows us people who have unusually large uploads or might be engaging in high-risk activities, such as searches or going to sites not categorized by their web crawler.
iboss was the best solution for us because, no matter what domain you were in, everything is under a single pane of glass, which is exactly what we wanted.
One of its most valuable features is its easy integration with various applications through its extensive application directory, offering hundreds or thousands of applications ready to configure.
It offers around eight thousand five hundred out-of-the-box connectors, providing an edge over other tools.
For the end user, it is beneficial as they do not have to remember a password or keep the password on a post-it for different applications; they just authenticate once to access several services and service providers.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
| Product | Mindshare (%) |
|---|---|
| Okta Platform | 4.5% |
| ThreatLocker Zero Trust Platform | 0.9% |
| iboss | 3.2% |
| Other | 91.4% |



| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 24 |
| Large Enterprise | 58 |
| Company Size | Count |
|---|---|
| Small Business | 51 |
| Midsize Enterprise | 13 |
| Large Enterprise | 9 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Okta Platform provides comprehensive identity and access management, featuring Active Directory Sync, user management, and app auto-provisioning. It ensures security through single sign-on and adaptive multi-factor authentication.
Okta Platform offers advanced integration capabilities, allowing seamless connection with in-house and cloud applications. Security features are robust, incorporating multi-factor authentication and SSO to prevent unauthorized access. Users benefit from its ease of use and the ability to integrate and manage numerous applications effectively. While generally praised, users note areas for improvement, such as high costs and complex setups. Better integrations with on-premises systems and third-party tools are desired along with enhanced error logging and reporting features.
What are Okta's key features?Companies across industries implement Okta to secure user authentication and streamline onboarding processes. It supports access management for both on-premises and cloud applications, synchronizing directories and facilitating SaaS services. Organizations benefit from reduced credential management complexity and improved IT infrastructure compliance.
Gain proactive, industry leading Zero Trust cybersecurity capabilities with ThreatLocker. By employing a deny-by-default approach, you will greatly enhance your security and operational efficiency. Solutions from ThreatLocker are focused on precise application control and
streamlined access management without administrative rights.
ThreatLocker Application Control solutions include Zero Trust Alllowlisting, Zero Trust Ringfencing and Privilege Access Management, significantly reducing any unauthorized software activities in your environment. Granular controls improve your overall security, while ringfencing enhances application behavior monitoring. Elevation requests will allow users to gain administrative access without IT intervention. The platform's ease of policy management and real-time threat visibility contribute to reduced help desk tickets and operational costs, ensuring protection against ransomware and
unauthorized applications.
What are the key features of ThreatLocker Zero Trust Platform?
What benefits and ROI should users expect?
Organizations often deploy ThreatLocker to ensure endpoint security in industries requiring stringent application control and administrative access management. Its functionalities are critical for managing Shadow IT, creating policies, and overseeing software installation approvals. Common usage spans sectors demanding robust security and compliance, such as finance and healthcare, where maintaining high
security and efficiency is crucial.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.