

OpenText Core Endpoint Protection and ThreatLocker Zero Trust Endpoint Protection compete in the endpoint security category. ThreatLocker appears to have an upper hand due to its comprehensive features for endpoint control.
Features: OpenText Core Endpoint Protection offers lightweight cloud management and auto-remediation, praised for its low system impact and AI capabilities in endpoint security. ThreatLocker Zero Trust provides strong application control through ring-fencing and allowlisting, with features like selective elevation and mobile app interactions for enhanced endpoint control.
Room for Improvement: OpenText Core Endpoint Protection could benefit from improved reporting, connectivity speed, and control over upgrade timing. It also faces challenges with false positives and lacks static analysis and ransomware protection. ThreatLocker Zero Trust could enhance training availability, user interface navigation, and flexibility in update management without overwhelming networks. The allowlisting tool requires better user-friendliness for end users.
Ease of Deployment and Customer Service: OpenText offers various deployment options, including Public and Hybrid Cloud. User experiences with technical support are mixed, with some reporting timely assistance and others struggling with responsiveness. ThreatLocker supports diverse deployment methods, from On-premises to Public Cloud, and is highly rated for customer service, often receiving high marks for knowledgeable support.
Pricing and ROI: OpenText Core Endpoint Protection is seen as cost-effective, although perceptions of ROI are mixed due to its basic antivirus functions. Some users note high pricing but acknowledge its affordability and stability. ThreatLocker is viewed as fairly priced for its comprehensive features, with some initial pricing challenges but recognized value. Its flexible pricing model supports growth and increases return on investment through functionality integration.
| Product | Market Share (%) |
|---|---|
| ThreatLocker Zero Trust Endpoint Protection Platform | 1.1% |
| OpenText Core Endpoint Protection | 1.1% |
| Other | 97.8% |
| Company Size | Count |
|---|---|
| Small Business | 35 |
| Midsize Enterprise | 2 |
| Large Enterprise | 2 |
| Company Size | Count |
|---|---|
| Small Business | 32 |
| Midsize Enterprise | 4 |
| Large Enterprise | 3 |
OpenText Core Endpoint Protection offers cloud-managed endpoint security with AI integration, providing real-time protection and lightweight performance. It ensures low system impact, seamless cloud integration, and cost-effective security solutions for various devices.
OpenText Core Endpoint Protection is a comprehensive endpoint security platform utilized by managed-service providers for antivirus and firewall functionality across servers, workstations, and mobile devices. It employs AI for robust threat detection, integrating with cloud applications for real-time updates. Multi-layered security features include malware protection, network defense, and DNS protection. Although connectivity and threat reporting need improvement, this platform extensively supports remote device management and integrates efficiently with Active Directory policies.
What are the key features of OpenText Core Endpoint Protection?OpenText Core Endpoint Protection finds application in industries requiring stringent data protection and peace of mind over device security. Managed-service providers implement this for comprehensive antivirus and firewall features, safeguarding multi-device networks. It is particularly useful for DNS protection and integrating with Active Directory policies, enabling secure yet flexible operations across sectors.
ThreatLocker Zero Trust Endpoint Protection Platform empowers organizations with application control, selective elevation, and ring-fencing to enhance security and prevent unauthorized access.
ThreatLocker provides comprehensive security management using application allowlisting to ensure only approved software operates across servers and workstations. The platform's centralized management simplifies security processes by consolidating multiple tools, and its robust capabilities align with zero-trust strategies by actively blocking unauthorized applications and ensuring compliance. Users note intuitive features such as mobile access, helpful training resources, and responsive support, which effectively reduce operational costs and help desk inquiries. The managed service providers prefer ThreatLocker to maintain network integrity by preventing malicious scripts and unauthorized access attempts. However, users identify room for growth in training and support flexibility, the interface, and certain technical challenges like network saturation from policy updates.
What are the most important features?Organizations utilize ThreatLocker for application allowlisting, ensuring only authorized software operates to prevent unauthorized access efficiently. Deployed across servers and workstations, its features support zero-trust principles and are favored by managed service providers for application management and network integrity.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.