Portnox CORE vs ThreatLocker Protect comparison

Cancel
You must select at least 2 products to compare!
Portnox Security Logo
1,887 views|1,282 comparisons
90% willing to recommend
ThreatLocker Logo
89 views|69 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Portnox CORE and ThreatLocker Protect based on real PeerSpot user reviews.

Find out in this report how the two Network Access Control (NAC) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Portnox CORE vs. ThreatLocker Protect Report (Updated: May 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It's a stable product.""Previous to the deployment we didn't have complete visibility of all the endpoints, all the devices that are connected to the network. But with the deployment of portnox, we could see all the devices and where they're connecting. We can equally segregate and apply different rules, policies to each location that we didn't monitor specifically.""It's so easy to set up, you don't need outside assistance.""It's easy to manage and troubleshoot thanks to the lightweight components.""I am impressed with the solution's voucher capability and authentication. The tool is integrated with Active Direct storage.""The product is a valuable solution within zero-trust architecture, enhancing network security and visibility.""For the information security team, the security level was improved because it helped to manage and prevent rogue devices from connecting to the corporate network. The reporting was granular, and reports we scheduled for delivery on Portnox were useful during investigations and audits, especially in cases where the IP address changed.""The most important feature is that this solution is agentless. So, you don't have to install any agents on endpoints."

More Portnox CORE Pros →

"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation.""The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds.""The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself.""The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network.""The sandbox functionality is fantastic.""Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it.""While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist.""Every single feature has been invaluable."

More ThreatLocker Protect Pros →

Cons
"The solution did have some stability issues, however, all I had to do was restart it.""The price could be better.""We have been having some issues with it. That's why we're considering migrating to Portnox Clear due to some limitations with CORE.""The integration between Portnox CORE and Portnox CLEAR can be better. These are two different systems, and there is no unique console for both devices. Portnox CORE is agentless, whereas Portnox CLEAR is not agentless.""Portnox CORE can improve on support for unmanaged switches (or hubs) and other brands of network devices. These kinds of devices are still in use in organisations, especially SMEs who cannot afford to buy a managed switch.""The product should consider more integration with vendors like Huawei. It should also improve visibility. The solution should offer a partner portal that can provide customers training on the in and out of the solution.""The licensing is based on a per-port price, even when you are not using all of the ports, and this is something that could be improved.""It might be beneficial to improve the ease of integrating the product with firewalls."

More Portnox CORE Cons →

"The reporting could be improved.""If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out.""Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats.""Adding applications to the allowlist can sometimes feel overwhelming.""ThreatLocker Allowlisting needs to improve its user interface and overall workflow.""One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system.""We identified several areas that we would like to see improved.""From a reporting perspective, enhancing the ability to customize reports would be beneficial."

More ThreatLocker Protect Cons →

Pricing and Cost Advice
  • "Pricing is not cheap. It is based on licenses per port. After licensing is purchased, you only pay for support."
  • "We pay for port licensing and support on a yearly basis, and it's not cheap."
  • "The vendor price is fair."
  • "The licensing module should be reviewed to count the number of devices instead of port numbers of total switches. There is a case for this where not all ports for a switch are used by devices. Unused ports are calculated in the license, then the customer pays for license for those unused ports."
  • "The users are not very happy with the new licensing option where there is only a subscription license. There is no perpetual license."
  • "The tool is more expensive than Fortinet."
  • "The solution is very expensive and I would rate it 10 out of 10."
  • "It's not cheap. It's not expensive. It's in the middle."
  • More Portnox CORE Pricing and Cost Advice →

  • "Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
  • "Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
  • "The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
  • "The pricing works fine for me. It's very reasonably priced."
  • "The pricing is fair and there is no hard sell."
  • "The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
  • "I find ThreatLocker's pricing to be reasonable for the services it provides."
  • "I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
  • More ThreatLocker Protect Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Network Access Control (NAC) solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It's easy to manage and troubleshoot thanks to the lightweight components.
    Top Answer:It's not cheap. It's not expensive. It's in the middle, so I'll probably give it a seven out of ten, where one is cheap and ten is expensive.
    Top Answer:We have been having some issues with it. That's why we're considering migrating to Portnox Clear due to some limitations with CORE. At the end of the day, Portnox Clear's capabilities are much more… more »
    Top Answer:The interface is clean and well-organized, making it simple to navigate and find what we need.
    Top Answer:ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program itself, and everything related to it being top-notch. If my CTO ever suggested… more »
    Top Answer:The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.
    Ranking
    Views
    1,887
    Comparisons
    1,282
    Reviews
    4
    Average Words per Review
    382
    Rating
    7.5
    Views
    89
    Comparisons
    69
    Reviews
    9
    Average Words per Review
    1,919
    Rating
    9.1
    Comparisons
    Also Known As
    Access Layers Portnox
    ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
    Learn More
    Overview

    Portnox CORE provides 100% actionable visibility of all devices that are connected to your network. As the first software-based NAC platform, Portnox CORE's patented solution allows you to manage the security and compliance challenges your organization faces in a smart and simple way.

    The ThreatLocker platform is a robust Zero Trust endpoint security solution, safeguarding organizations against ransomware, malware, and various cyber threats through a unified approach. It incorporates key features like Application Allowlisting, Ringfencing, and Dynamic Network Control. Application Allowlisting ensures that only authorized applications run on endpoints, preventing unauthorized software and thwarting ransomware and malware threats. Ringfencing isolates approved applications from one another and the operating system, inhibiting malware spread and unauthorized access to sensitive data. Dynamic Network Control regulates traffic, enhancing security by closing unused ports and opening them as needed for authorized connections. The ThreatLocker platform simplifies security management with a centralized console and supports Windows, macOS, and Linux endpoints. 

    Top Industries
    REVIEWERS
    Financial Services Firm57%
    Media Company14%
    Transportation Company14%
    Hospitality Company14%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Financial Services Firm11%
    Comms Service Provider7%
    Educational Organization7%
    VISITORS READING REVIEWS
    Computer Software Company39%
    Retailer6%
    Government6%
    Healthcare Company5%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise29%
    Large Enterprise14%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise22%
    Large Enterprise52%
    REVIEWERS
    Small Business93%
    Midsize Enterprise7%
    VISITORS READING REVIEWS
    Small Business57%
    Midsize Enterprise12%
    Large Enterprise31%
    Buyer's Guide
    Portnox CORE vs. ThreatLocker Protect
    May 2024
    Find out what your peers are saying about Portnox CORE vs. ThreatLocker Protect and other solutions. Updated: May 2024.
    771,157 professionals have used our research since 2012.

    Portnox CORE is ranked 11th in Network Access Control (NAC) with 14 reviews while ThreatLocker Protect is ranked 6th in Network Access Control (NAC) with 13 reviews. Portnox CORE is rated 8.2, while ThreatLocker Protect is rated 9.2. The top reviewer of Portnox CORE writes "Simple UI, easy deployment but slow authentication times for devices". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". Portnox CORE is most compared with Cisco ISE (Identity Services Engine), Aruba ClearPass, Fortinet FortiNAC, Forescout Platform and Portnox Clear, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and GravityZone Business Security. See our Portnox CORE vs. ThreatLocker Protect report.

    See our list of best Network Access Control (NAC) vendors.

    We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.