


OpenText Core Endpoint Protection and ThreatLocker Zero Trust Platform compete in the endpoint security category. ThreatLocker tends to have an advantage in application and granular management through its zero trust methodology.
Features: OpenText Core Endpoint Protection is lightweight with efficient deployment, centralized management, and cloud management with automatic updates. ThreatLocker Zero Trust Platform focuses on application control and allow-listing, offering precision management, ringfencing, and elevation control for enhanced security and preventing unapproved processes.
Room for Improvement: OpenText Core Endpoint Protection requires better threat detection, reporting, support responsiveness, and backup options. ThreatLocker needs better integration of identity, authentication features, SIEM tool integration, and refinement of learning mode features.
Ease of Deployment and Customer Service: OpenText Core Endpoint Protection offers cloud deployment options and satisfactory support but with mixed reviews on response times. ThreatLocker provides smooth onboarding and high customer satisfaction with responsive and comprehensive support across deployment environments.
Pricing and ROI: OpenText Core Endpoint Protection offers affordable, cost-effective licenses per endpoint attractive to various business sizes, yielding adequate ROI through endpoint management savings. ThreatLocker features a flexible pricing model that, while higher for some, is justified by advanced zero trust security features. Both present competitive pricing with ThreatLocker excelling in features and customization.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.5% |
| ThreatLocker Zero Trust Endpoint Protection Platform | 1.2% |
| OpenText Core Endpoint Protection | 1.3% |
| Other | 94.0% |


| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 20 |
| Large Enterprise | 47 |
| Company Size | Count |
|---|---|
| Small Business | 35 |
| Midsize Enterprise | 2 |
| Large Enterprise | 2 |
| Company Size | Count |
|---|---|
| Small Business | 51 |
| Midsize Enterprise | 13 |
| Large Enterprise | 8 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
OpenText Core Endpoint Protection offers cloud-managed endpoint security with AI integration, providing real-time protection and lightweight performance. It ensures low system impact, seamless cloud integration, and cost-effective security solutions for various devices.
OpenText Core Endpoint Protection is a comprehensive endpoint security platform utilized by managed-service providers for antivirus and firewall functionality across servers, workstations, and mobile devices. It employs AI for robust threat detection, integrating with cloud applications for real-time updates. Multi-layered security features include malware protection, network defense, and DNS protection. Although connectivity and threat reporting need improvement, this platform extensively supports remote device management and integrates efficiently with Active Directory policies.
What are the key features of OpenText Core Endpoint Protection?OpenText Core Endpoint Protection finds application in industries requiring stringent data protection and peace of mind over device security. Managed-service providers implement this for comprehensive antivirus and firewall features, safeguarding multi-device networks. It is particularly useful for DNS protection and integrating with Active Directory policies, enabling secure yet flexible operations across sectors.
Gain proactive, industry leading Zero Trust cybersecurity capabilities with ThreatLocker. By employing a deny-by-default approach, you will greatly enhance your security and operational efficiency. Solutions from ThreatLocker are focused on precise application control and
streamlined access management without administrative rights.
ThreatLocker Application Control solutions include Zero Trust Alllowlisting, Zero Trust Ringfencing and Privilege Access Management, significantly reducing any unauthorized software activities in your environment. Granular controls improve your overall security, while ringfencing enhances application behavior monitoring. Elevation requests will allow users to gain administrative access without IT intervention. The platform's ease of policy management and real-time threat visibility contribute to reduced help desk tickets and operational costs, ensuring protection against ransomware and
unauthorized applications.
What are the key features of ThreatLocker Zero Trust Platform?
What benefits and ROI should users expect?
Organizations often deploy ThreatLocker to ensure endpoint security in industries requiring stringent application control and administrative access management. Its functionalities are critical for managing Shadow IT, creating policies, and overseeing software installation approvals. Common usage spans sectors demanding robust security and compliance, such as finance and healthcare, where maintaining high
security and efficiency is crucial.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.