

Portnox and ThreatLocker Zero Trust Platform compete in the security solutions category, with ThreatLocker gaining the upper hand due to its emphasis on application control to minimize vulnerabilities and vehicle attack surfaces.
Features: Portnox offers network access control, intuitive network device management without agents, and simplified MAC address management. ThreatLocker emphasizes application control with allow-listing, elevation control, and minimizes potential vulnerabilities by only allowing trusted applications and processes.
Room for Improvement: Portnox should focus on improving support during Asia Pacific hours, enhance integration with Huawei, and provide more effective training for partners. ThreatLocker could benefit from integrating an identity and multi-factor authentication module, and optimizing its Learning Mode to reduce manual efforts.
Ease of Deployment and Customer Service: Portnox primarily offers on-premises deployment options with limited cloud capabilities, while its customer service is well-rated but could improve its response times. ThreatLocker supports hybrid and cloud deployments extensively and is praised for its personalized customer service and support.
Pricing and ROI: Portnox is cost-effective, especially for small to medium enterprises, with a pricing structure based on network ports. ThreatLocker's pricing is higher but reflects its comprehensive services and effective support. Portnox saves operational costs via streamlined network management, while ThreatLocker provides a strong ROI through improved security and reduced additional security tool needs.
If I compare this to an on-premises environment using Cisco ISE or Aruba ClearPass, it would require phenomenally large teams for infrastructure management.
If you were moving from a traditional on-premise NAC that was 100% managed by the IT department, there would be great savings in going to a cloud-based NAC with Portnox.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
Based on what we use ThreatLocker Zero Trust Endpoint Protection Platform for with the same functionalities and packaging, it was around 13 or 14 hours.
We have the MDR package as well, and just knowing someone is watching those endpoints at 3:00 a.m. is a lifesaver that you cannot put a dollar figure on.
The main area needing improvement is the technical knowledge of support staff.
For very high severity issues where the entire office is non-functional, response time is within 30 minutes.
They respond very immediately and provide detailed, amazing support.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
They ensure the backend can support it and do the provisioning while maintaining headroom and elasticity.
I rate scalability a ten; you simply pay and you get more.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
ThreatLocker Zero Trust Endpoint Protection Platform scales very smoothly with our growing needs.
The product itself is available and its uptime is 100%.
In the four years that I used Portnox, if it crashed or the server crashed, that would not have been more than once.
If there is a version one and another version, the communication between the organization using it and Portnox should be firm so they can coordinate effectively.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
Ideally, we should be able to search for any MAC address in the database, regardless of its authentication status, to see all its associated groups and potential conflicts.
When I'm doing filtering at times, it doesn't filter the items properly.
They don't have much support during Asia Pacific hours.
Controlling the cloud environment, not just endpoints, is crucial.
ThreatLocker Zero Trust Endpoint Protection Platform could improve by being a little more hands-off, perhaps by having a team inside ThreatLocker that does all the vetting of patches; having one person hired by ThreatLocker to check out patches means that a million other industries using ThreatLocker Zero Trust Endpoint Protection Platform do not have to vet the same patch, ultimately saving time and money around the world.
This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.
If you compare Portnox with all other well-known standard products, it is the cheapest.
The pricing is a bit high, possibly due to the cloud features and running instances across regions like the US, Asia, and Europe.
You are charged according to the number of users.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
Money is saved because it is not costly, and I would suggest it for other companies.
It's notable how Portnox has improved operational efficiency.
It is a very robust application because three teams use that part: the network team, the security team, and the support people.
It is possible to find the MAC address in the switch, but in Portnox, it is very useful to see the status of those ports, and that increases our security.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
| Product | Mindshare (%) |
|---|---|
| ThreatLocker Zero Trust Endpoint Protection Platform | 1.4% |
| Portnox | 5.4% |
| Other | 93.2% |


| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 5 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 51 |
| Midsize Enterprise | 13 |
| Large Enterprise | 8 |
Portnox provides advanced network visibility and proactive security without complexity, ensuring easy setup and scalability. Its agentless nature and intuitive design enable seamless device management and system integration, promoting efficient network operations and endpoint security.
Portnox is known for offering comprehensive network access control, providing firms with vital tools for managing authentication and securing endpoint devices. It's praised for ease of use in integrating with systems such as RADIUS servers and offering detailed analytical capabilities to ensure compliance and control unauthorized access. While users appreciate the intuitive interface and device management, improvements have been suggested in the areas of better GUI, integration with firewalls, and enhanced configuration methods. Portnox aids in handling dynamic VLAN assignments and securing access in both wired and wireless networks, proving particularly valuable for on-premises and remote environments.
What are the key features of Portnox?In industries where network security is paramount, such as finance and healthcare, Portnox is implemented to fortify access control and manage endpoint connections effectively. Its ability to secure both on-premises and remote environments makes it a versatile choice across sectors that require stringent access management, particularly where unauthorized device connections pose significant risks.
ThreatLocker Zero Trust Platform employs a deny-by-default approach to enhance security and operational efficiency, focusing on precise application control and streamlined access management without administrative rights.
ThreatLocker Zero Trust Platform offers advanced application control, allowlisting, and elevation control, significantly reducing unauthorized software activities. Its granular controls improve security, while ringfencing enhances application monitoring. Elevation requests allow users to gain administrative access without IT intervention. The platform's ease of policy management and real-time threat visibility contribute to reduced help desk tickets and operational costs, ensuring protection against ransomware and unauthorized applications.
What are the key features of ThreatLocker Zero Trust Platform?Organizations often deploy ThreatLocker Zero Trust Platform for ensuring endpoint security in industries requiring stringent application control and administrative access management. Its functionalities are critical for managing Shadow IT, creating policies, and overseeing software installation approvals. Common usage spans sectors demanding robust security and compliance, such as finance and healthcare, where maintaining high security and efficiency is crucial.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.