Seqrite Endpoint Security vs ThreatLocker Protect comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Fortinet FortiEDR
Sponsored
Average Rating
7.8
Number of Reviews
32
Ranking in other categories
Endpoint Detection and Response (EDR) (12th)
Seqrite Endpoint Security
Average Rating
7.6
Number of Reviews
22
Ranking in other categories
Endpoint Protection Platform (EPP) (25th)
ThreatLocker Protect
Average Rating
9.2
Number of Reviews
13
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (26th), Advanced Threat Protection (ATP) (16th), Application Control (4th), ZTNA (9th), Ransomware Protection (6th)
 

Mindshare comparison

As of June 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Fortinet FortiEDR is 5.0%, up from 3.7% compared to the previous year. The mindshare of Seqrite Endpoint Security is 2.0%, up from 1.1% compared to the previous year. The mindshare of ThreatLocker Protect is 0.7%, down from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
Unique Categories:
Endpoint Detection and Response (EDR)
7.4%
No other categories found
Network Access Control (NAC)
0.3%
Advanced Threat Protection (ATP)
0.4%
 

Featured Reviews

SP
May 1, 2023
We saw time to value within two weeks of implementing the solution, which strengthened our use cases
We use FortiAI, FortiSIEM, and FortiEDR Fortinet helped us scale large-scale deals with clients because of its strong offerings. Fortinet is very straightforward to use. I have access to a lot of technical resources, and I have been able to use them effectively. Fortinet has helped free up around…
MJ
Nov 15, 2022
Affordable and quick to deploy but the response of support was slow during procurement
User management could be improved. For example, if you have to create different types of user groups based on what kind of access they would need, that should be easier. We keep standard rules for certain profiles. The user management is not that good currently, and so we have trouble with handling user management. Once the client is installed, then we can control it. However, the initial setup should be managed completely in mobile mode. For example, if a laptop is delivered directly from the vendor to an employee and we can trigger the command from a central place to install the client and run the standard installations as well, that would make things easier. I'm a bit concerned about the responsiveness of support.
Jaden Scatton - PeerSpot reviewer
Oct 18, 2023
ThreatLocker Allowlisting
Definitely, the allowed listing and the Zero Trust platform are the most useful aspects of the solution. It is very easy for an administrator to approve and deny requests. So easy in fact that I have given it to a majority of our client's main point of contact, where they are able to approve them, whether it's via their mobile cell phone or logging into the portal on their computers. The overall visibility into software approval requests of end users is very good. We can see everything that we need to see including the application path, the user that requested it, and the computer host name. When it's approved on the workstation endpoint, it pops up with a text box saying, “Hey, this has been approved. Click here to install your application.” We allow listing with the ring-fencing. We do implement that when needed. For example, for Word and Excel, there's no need for those to talk out to PowerShell and command prompt, so we do have those ring-fenced where they cannot speak to that. Their combination for blocking unknown threats on attacks is good. If it's not something we've previously approved, it does get locked every time. Sometimes it even gets in the way of our day-to-day, which is good. It's what we wanted it to do. It does its job a little too well. It is great for establishing trust for every access request no matter where it comes from. Whether the user is an admin or not, they all still have to get their software approved. Once it has been approved, it makes it easy for everyone as they're able to install it on their own without approval again. It helped reduce our organization's help desk tickets. We haven't had nearly as many clients submitting tickets, say, for example, McAfee installing when they're trying to install Adobe. We approve Adobe and we don't install the McAfee install. That will get in the way a lot, and we have seen a major reduction in tickets such as those. Being able to not have to worry about what everyone's installing all the time has definitely improved our ability to focus our attention on other projects.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This is stable and scalable."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"Fortinet is very user-friendly for customers."
"The product's initial setup phase is very easy."
"Impressive detection capabilities"
"The stability is very good."
"The product detects and blocks threats and is more proactive than firewalls."
"Ability to get forensics details and also memory exfiltration."
"The convenience has been great."
"In case it works, we are looking to use features like USB blocking, file upload alerts, and other antivirus features as well, but this software has to work first."
"The most valuable feature is its endpoint protection, particularly the antivirus component. It has been very effective in protecting our clients, and since its installation, we haven't encountered any issues with compromised endpoints or virus impacts."
"We found the DLP to be innovative and useful."
"Endpoint Security's best features are inventory, asset management, and quick scanning."
"The most valuable features of the solution are DLP, XDR, and EDR functionalities."
"The solution is stable."
"The only thing that I have found useful is that I have an overview of my systems in the networks."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"The sandbox functionality is fantastic."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
 

Cons

"We find the solution to be a bit expensive."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"We'd like to see more one-to-one product presentations for the distribution channels."
"The SIEM could be improved."
"The solution should address emerging threats like SQL injection."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"It takes about two business days for initial support, which is too slow in urgent situations."
"The solution needs to improve stability."
"In the next version, they should improve the areas of utility and centralized control."
"Deployment of Seqrite Endpoint Security is generally straightforward. The only complexity we encounter is that, since it is cloud-based, there can be delays in updating the endpoint's status."
"A handbook of known issues and quick fixes should be given so that troubleshooting and frustration are less."
"Sometimes, small and medium businesses, or even startups with just five, ten, or fifteen systems, are also keen to secure their data. There is a reluctance on the part of the technical team to extend installation support when the opportunity sizes are smaller. Seqrite Endpoint Security has a lot of value. Still, its marketing could be done much better on a larger scale, especially in India, in light of the new DPDP 2023 Act, which the Indian Parliament passed. It would be even more valuable if Seqrite could incorporate features to help companies comply with this law, it would be even more helpful."
"We would like the solution to have integration with other security solutions so that we can have a single base for monitoring all the security incidents and concerns."
"The product or service could be improved by incorporating SIEM integrations to enable the collection of logs."
"The support offered by the tool is an area of concern where improvements are required."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"Adding applications to the allowlist can sometimes feel overwhelming."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"The reporting could be improved."
 

Pricing and Cost Advice

"It's moderately priced, neither cheap nor expensive."
"We got a good deal on licensing, so it is in the competitive range."
"The hardware costs about €100,000 and about €20,000 annually for access."
"The pricing is good."
"I would rate the solution's pricing an eight out of ten."
"It is expensive and I would rate it 8 on the scale."
"The solution is not expensive."
"The price is comprable to other endpoint security solutions."
"Licensing fees are on a yearly basis. Compared to other solutions, this solution is cheaper."
"You need to pay for a yearly license for Seqrite Endpoint Security, which is expensive."
"My company needs to purchase a yearly subscription for the licensing costs for Seqrite Endpoint Security."
"I give the cost of the solution a seven out of ten."
"We get the tool for around 1200 rupees for a three-year subscription. I rate its pricing a nine out of ten."
"The solution has reasonable pricing. There is one pricing without any hidden charges. They have to pay once a year or three years."
"The license isn't expensive."
"The licensing fee is 200 Bangladeshi Taka per client per year."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"The pricing is fair and there is no hard sell."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"ThreatLocker's pricing seems justifiable."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"The pricing works fine for me. It's very reasonably priced."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
787,779 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Government
8%
Manufacturing Company
8%
Financial Services Firm
8%
Computer Software Company
22%
Educational Organization
9%
Manufacturing Company
7%
Media Company
7%
Computer Software Company
38%
Retailer
6%
Government
5%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What's the difference between Fortinet's FortiEDR and FortiClient?
I suggest Fortinet’s FortiEDR over FortiClient for several reasons. For starters, FortiEDR guarantees solid protectio...
What do you like most about Fortinet FortiEDR?
We have FortiEDR installed on all our systems. This protects them from any threats.
What is your experience regarding pricing and costs for Fortinet FortiEDR?
The pricing of the solution is on the high end compared to its offerings and capabilities.
What do you like most about Seqrite Endpoint Security?
The most valuable part of the solution is its ransomware backup feature.
What is your experience regarding pricing and costs for Seqrite Endpoint Security?
The pricing is reasonable. The price is according to the engine.
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program ...
What needs improvement with ThreatLocker Allowlisting?
The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjuncti...
 

Also Known As

enSilo, FortiEDR
Seqrite End Point Security, Seqrite EPS
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

 

Sample Customers

Financial, Healthcare, Legal, Technology, Enterprise, Manufacturing ... 
Gadre, Bharat Vikas Group, Fernandez Hospital, Fabtech Projects & Engineering, KIMS Hospital, National Steel And Agro Industries, Sardar Patel University, Sterling Wilson, Chowgule Industries
Information Not Available
Find out what your peers are saying about Seqrite Endpoint Security vs. ThreatLocker Protect and other solutions. Updated: June 2024.
787,779 professionals have used our research since 2012.