No more typing reviews! Try our Samantha, our new voice AI agent.

Seqrite Endpoint Security vs ThreatLocker Zero Trust Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 17, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Protection Platform (EPP)
4th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Seqrite Endpoint Security
Ranking in Endpoint Protection Platform (EPP)
35th
Average Rating
7.6
Reviews Sentiment
6.9
Number of Reviews
23
Ranking in other categories
No ranking in other categories
ThreatLocker Zero Trust Pla...
Ranking in Endpoint Protection Platform (EPP)
6th
Average Rating
9.2
Reviews Sentiment
7.1
Number of Reviews
74
Ranking in other categories
Network Access Control (NAC) (4th), Advanced Threat Protection (ATP) (4th), Application Control (1st), ZTNA as a Service (4th), ZTNA (5th), Ransomware Protection (1st)
 

Mindshare comparison

As of April 2026, in the Endpoint Protection Platform (EPP) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.6%, down from 4.0% compared to the previous year. The mindshare of Seqrite Endpoint Security is 1.1%, down from 1.4% compared to the previous year. The mindshare of ThreatLocker Zero Trust Platform is 1.2%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.6%
ThreatLocker Zero Trust Platform1.2%
Seqrite Endpoint Security1.1%
Other94.1%
Endpoint Protection Platform (EPP)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
ManishKumar14 - PeerSpot reviewer
DGM IT at Seth Anandram Jaipuria Group of Educational Institutions
Centrally managed, easy to configure, and easy to use
Seqrite Endpoint Security protects individual machines, servers, and emails against malware, viruses, and spam attacks The solution is centrally managed, easy to configure, and easy to use. It allows you to patch your required reports. The solution provides central deployment, remote deployment,…
Santo Joy - PeerSpot reviewer
Head Of Cyber Security at a outsourcing company with 201-500 employees
Security controls have been strengthened with granular application, ringfencing, and access policies
The features of ThreatLocker Zero Trust Endpoint Protection Platform that I like the most are the Ringfencing, elevation control, storage control, and application whitelisting functionality. For examples of how these features benefit my company, we were looking for a solution across various vendors to actually implement application whitelisting controls. ThreatLocker's agent, which is very lightweight and does not use much CPU or RAM, helped us achieve that solution. Ringfencing was an add-on that ticked off a lot of Australian framework security controls, which is the reason we chose it. My impression of the allowlisting feature in terms of managing which software, scripts, and libraries run on my devices is that ThreatLocker's community page has a lot of information around this, which is very helpful. Not only that, the Cyber Hero support that ThreatLocker provides gives us insights and best practices, helping us achieve that solution and guiding us to the right platform. The impact of Ringfencing on controlling the behavior of approved applications has been a big winner for us because it is something that many other platforms do not provide as a functionality. Having that allowed us to identify what applications talk to each other, which is something that many other platforms do not do. The network control feature impacts my ability to manage network traffic across my endpoints and servers. We have not used this widely across all our partners, but wherever required, we use it. It has been an easy solution for those customers to get that control implemented. The elevation feature's role in facilitating just-in-time administrative access for approved applications shows that elevation control helps in many use cases involving remote control platforms, door usage, and security system platforms that require local admins. There are many solutions that provide this functionality, but the licensing cost seems to be expensive, and it also adds another solution into the mix. Rather than doing that, we try to use ThreatLocker Zero Trust Endpoint Protection Platform to achieve that control. Regarding the storage control feature, I have used it. The primary function is USB blocking, which is very widely adopted, and also just locking down and allowing certain users to access certain file locations helps us there. When it comes to enforcing policy-driven access over various storage devices, it depends on the business risk adapted by the companies that we support, but generally the use case is USB and external storage devices where companies know that is a risk, but they do not have appropriate solutions. There are EDR platforms that claim to do this, but ThreatLocker Zero Trust Endpoint Protection Platform does it at an advanced level. My assessment of the efficiency of the real-time threat intelligence and category controls employed by Web Control in blocking malicious and non-compliant sites leads me to think that Web Control is another functionality within ThreatLocker Zero Trust Endpoint Protection Platform that is an add-on on top of the current set. That is another solution that we use based on what is required for the company, but again, that is not widely adapted yet for our partners.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From the Palo Alto side, whatever they buy, they integrate that really well into their integration suite, and that makes a massive difference."
"The information the dashboard provides is very clear."
"The product's initial setup phase is very easy."
"Its interface and pricing are most valuable. It is better than other vendors in terms of security."
"The stability of the solution is very good, we have about 100 users on it right now, and we use it twice a week."
"It can automatically correlate events and logs, which is very helpful for an IT administrator. It can correlate different kinds of malware activities over a network, agent, or host system. You do not need to do it manually. It is a good feature. It is also a user-friendly solution. We have deployed it on the cloud because our space does not provide any flexibility for on-premises deployment, but Palo Alto has added some flexibility to install it on-premises. It must be like the same Cortex XDR agent for all the VPN services, web filtering services, and everything else."
"Its ability to react to cyber data attacks is awesome."
"Cortex XDR by Palo Alto Networks saves time in various ways, although the user interface is fairly standard."
"In case it works, we are looking to use features like USB blocking, file upload alerts, and other antivirus features as well, but this software has to work first."
"There are many features available in this solution, such as asset management."
"We were excited about the cloud-based management features of Seqrite and were looking to use the same."
"The solution effectively detects malicious files and blocks sign-ins."
"The most valuable part of the solution is its ransomware backup feature."
"The update process and policy control are good."
"The convenience has been great."
"The two valuable features are anti-ransomware and data loss protection."
"Essentially, ThreatLocker Zero Trust Endpoint Protection Platform is super easy to use, very informative, and it does everything quickly and easily."
"The application control is highly valued by me."
"ThreatLocker Zero Trust Endpoint Protection Platform has helped our company save on operational costs and expenses significantly."
"Being able to protect and trust nothing by default, known as zero trust, is the most important feature to me."
"We have gotten a lot of use out of the feature of removing local admins from a lot of computers with ThreatLocker Zero Trust Endpoint Protection Platform."
"ThreatLocker Protect has improved my organization greatly."
"My experience with the pricing, setup cost, and licensing is remarkable."
"ThreatLocker Zero Trust Endpoint Protection Platform has definitely saved us on operational costs and expenses by preventing incidents."
 

Cons

"I think sometimes Cortex XDR agent automatically stops event capturing from the device, and then even the dashboard does not get any notifications from the agent."
"While using Cortex, I noticed some aspects that could be improved, such as increasing the synchronization speed between XDR and Xnor."
"While using Cortex, I noticed some aspects that could be improved, such as increasing the synchronization speed between XDR and Xnor."
"There is a severe gap in functionality between Windows, Linux, and Mac versions. For example all folder restriction settings are Windows only. Traps 5.0+ does not have SAML / LDAP integration."
"In general, the price could be more competitive."
"It is not very strong in terms of endpoint management. It should have additional features like DLP, encryption, or advanced device control."
"They have the worst support, as a company, that I have ever worked with, as they are difficult to get a hold of and keep on the phone. They don't know what they are talking about when you get them on the phone. They don't like to respond to messages when you send them to them. They like to "research problems" for weeks on end, then pass you off to somebody else."
"The product's pricing could be better."
"When it comes to the support provided by the product, I see that Seqrite is not as mature as the other products in the market."
"Sometimes, small and medium businesses, or even startups with just five, ten, or fifteen systems, are also keen to secure their data. There is a reluctance on the part of the technical team to extend installation support when the opportunity sizes are smaller. Seqrite Endpoint Security has a lot of value. Still, its marketing could be done much better on a larger scale, especially in India, in light of the new DPDP 2023 Act, which the Indian Parliament passed. It would be even more valuable if Seqrite could incorporate features to help companies comply with this law, it would be even more helpful."
"The solution could improve by providing better security and a cloud base version."
"The solution's integration capabilities are moderate and could be improved."
"Endpoint Security would be improved by adding DLP."
"The pricing could be a bit lower."
"The interface is slow."
"The support offered by the tool is an area of concern where improvements are required."
"I find that the learning mode is too accessible. Technicians sometimes default to it instead of manually building policy controls."
"I have encountered some problems with stability, however, they are resolved quickly."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
"Some reporting areas need improvement. We need to generate more reports."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"I have several clients in the last few months that have definitely caused a problem where a domain controller completely destroyed replication once Network Control was put in place, and now our AVD servers in Azure also lose domain trust occasionally and it is intermittent, making it rather hard to prove to ThreatLocker Zero Trust Endpoint Protection Platform that they really need to look at when there is a VPN in the middle of a domain controller."
"To become the best solution, some sort of integration or remote management, like remotely connecting, could be beneficial."
 

Pricing and Cost Advice

"The price of the solution is high for the license and in general."
"The cost of Cortex XDR by Palo Alto Networks is $55 to $90 USD per endpoint per month."
"Very costly product."
"I don't have any issues with the pricing. We are satisfied with the price."
"Our customers have expressed that the price is high."
"The price is on the higher side, but it's okay."
"The pricing is a little high. It is per user per year."
"The price of the solution could be reduced. I have customers that have voiced that the solution is good for the value but if I want to sell more of the solution the price reduction would help."
"My company needs to purchase a yearly subscription for the licensing costs for Seqrite Endpoint Security."
"The solution has reasonable pricing. There is one pricing without any hidden charges. They have to pay once a year or three years."
"There is no option to refund the money and unfortunately, we bought a three-year license, seeing that Quick Heal is a long-established player in the market."
"It is a cheaply priced product."
"I give the cost of the solution a seven out of ten."
"Endpoint Security is cheaper than Trend Micro."
"We pay approximately $1,500 for licenses for the solution."
"Licensing fees are on a yearly basis. Compared to other solutions, this solution is cheaper."
"The pricing is pretty fair, considering other solutions. Licensing-wise, it did not take long."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"We have encountered a few challenges regarding pricing, contract renewals, and additions. As we explored adding features like Cyber Hero, it proved to be an increased expense for our clients. This was primarily a mistake on our part due to how we initially priced it to clients."
"I do not deal with pricing, but I assume it is cost-effective for us. We choose a solution based on functionality and affordability."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"ThreatLocker's pricing seems justifiable."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
889,855 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
13%
Financial Services Firm
12%
Comms Service Provider
8%
Manufacturing Company
7%
Computer Software Company
12%
Comms Service Provider
9%
Manufacturing Company
9%
Financial Services Firm
8%
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Retailer
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise20
Large Enterprise48
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise12
Large Enterprise1
By reviewers
Company SizeCount
Small Business51
Midsize Enterprise13
Large Enterprise8
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What is your experience regarding pricing and costs for Seqrite Endpoint Security?
The solution's pricing is good for us, where it is neither cheap nor expensive.
What needs improvement with Seqrite Endpoint Security?
The solution's integration capabilities are moderate and could be improved.
What is your primary use case for Seqrite Endpoint Security?
Seqrite Endpoint Security protects individual machines, servers, and emails against malware, viruses, and spam attacks.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
My experience with pricing, setup cost, and licensing for ThreatLocker Zero Trust Endpoint Protection Platform is goo...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker Zero Trust Endpoint Protection Platform can be improved by providing admin rights that allow us to manag...
What is your primary use case for ThreatLocker Allowlisting?
My main use case for ThreatLocker Zero Trust Endpoint Protection Platform is to secure the server.A specific example ...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Seqrite End Point Security, Seqrite EPS
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Gadre, Bharat Vikas Group, Fernandez Hospital, Fabtech Projects & Engineering, KIMS Hospital, National Steel And Agro Industries, Sardar Patel University, Sterling Wilson, Chowgule Industries
Information Not Available
Find out what your peers are saying about Seqrite Endpoint Security vs. ThreatLocker Zero Trust Platform and other solutions. Updated: April 2026.
889,855 professionals have used our research since 2012.