

Sophos Endpoint and ThreatLocker Zero Trust Endpoint Protection Platform are competitors in the cybersecurity domain, particularly focusing on endpoint protection. Sophos has an advantage in integrated device security, while ThreatLocker excels in application control and zero trust strategies.
Features: Sophos Endpoint is known for effective virus definitions, ransomware detection, and centralized management of the security environment, including firewall integration and Synchronized Security. It is appreciated for its ease of deployment, silent scanning, and robust network infection prevention capabilities. ThreatLocker Zero Trust Endpoint Protection allows administrators granular control with allowlisting and ring-fencing. It offers robust learning modes and supports zero-trust strategies effectively. Users value its mobile app accessibility, comprehensive security measures, and excellent support.
Room for Improvement: Users suggest enhancements for Sophos Endpoint related to support responsiveness, broader device compatibility, and more straightforward deployment processes. Resource intensity and occasional support delays are other noted issues. ThreatLocker could improve its user interface and support ticket visibility. Streamlining policy management and improving reporting features are also potential areas for enhancement. Sophos needs to improve support efficiency and resource management, while ThreatLocker could benefit from easing its complex setup and improving user experience.
Ease of Deployment and Customer Service: Sophos Endpoint offers extensive deployment options across public clouds and on-premises with mixed user feedback on support efficiency. Some appreciate its scalability, while others desire quicker response times. ThreatLocker Zero Trust is praised for its ease of deployment and responsive customer support, making it conducive for timely assistance.
Pricing and ROI: Sophos Endpoint is often appreciated for its competitive pricing in enterprise settings but advanced features can make licensing costs higher. ThreatLocker’s pricing is seen as reasonable and transparent, with flexible models facilitating scalable options for MSPs. ThreatLocker ensures predictable costs with straightforward ROI driven by its robust protection capabilities, contrasting with Sophos' broader service benefits but sometimes higher baseline expense.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
The main return on investment is peace of mind, knowing that with ThreatLocker on any endpoint, it will almost always block all malicious code or exploits, even zero-day exploits.
It keeps malware, Trojans, and ransomware at bay.
I rate Sophos support as excellent, giving it a ten out of ten.
They have introduced a dedicated role called Technical Account Manager (TAM) for every partner.
The Sophos people here in South Africa are very helpful.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
I would rate it a ten out of ten for scalability.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
The enterprise integration is very poor, requiring a lot of manual work.
Users have noted that daily upload limits per device, overall data lake storage capacity tied to licenses, and daily API query limits can be restrictive.
I think there should be templates in place so I do not have to make everything from scratch; having templates for NATing, de-NATing, and LAN to WAN rules would save us time.
Controlling the cloud environment, not just endpoints, is crucial.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
The cost is reasonable and cheaper than other alternatives.
It is quite affordable; I think the pricing and licensing are reasonable.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
I had a really good deal at the time, and it continues to be cost-effective.
Key features for comprehensive detection and prevention include advanced threat prevention, ransomware protections, exploit prevention, and AI-powered detections.
Web filtering helps provide protection by allowing me to block unwanted and unauthorized websites from Sophos EPP Suite, which helps prevent unauthorized intrusion, thus keeping our organization servers secure.
With the reseller management, I can manage multiple clients without having to log in to each client.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
| Product | Market Share (%) |
|---|---|
| ThreatLocker Zero Trust Endpoint Protection Platform | 1.1% |
| Sophos EPP Suite | 1.1% |
| Other | 97.8% |

| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 7 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 32 |
| Midsize Enterprise | 4 |
| Large Enterprise | 3 |
Sophos Endpoint offers centralized management, AI-powered detection, and comprehensive threat prevention. It is designed for antivirus, ransomware defense, and threat management across sectors like education, healthcare, and finance. Its benefits include synchronized security, simple deployment, and a user-friendly interface.
Sophos Endpoint provides multiple functionalities to protect networks, devices, and applications. It emphasizes advanced threat prevention and AI-powered detections, enhancing protection against malware and ransomware. Combining web filtering, machine learning, and data loss prevention ensures a secure environment, while integration with other Sophos tools allows for streamlined security management. Sophos Endpoint addresses the need for efficient protection with lightweight operations, synchronized security between endpoints and firewalls, and notable ease of deployment. Resource management is a key focus, alongside improving antivirus detection and systems integration. Price competitiveness and expanded support for macOS are also priorities.
What are some key features of Sophos Endpoint?In the education, healthcare, and finance sectors, Sophos Endpoint is utilized to ensure secure IT infrastructure. It supports initiatives in digital safety and compliance with integration capabilities for web filtering, firewall, and VPN security. Organizations benefit from mobile device management and disk encryption to safeguard sensitive information effectively.
ThreatLocker Zero Trust Endpoint Protection Platform empowers organizations with application control, selective elevation, and ring-fencing to enhance security and prevent unauthorized access.
ThreatLocker provides comprehensive security management using application allowlisting to ensure only approved software operates across servers and workstations. The platform's centralized management simplifies security processes by consolidating multiple tools, and its robust capabilities align with zero-trust strategies by actively blocking unauthorized applications and ensuring compliance. Users note intuitive features such as mobile access, helpful training resources, and responsive support, which effectively reduce operational costs and help desk inquiries. The managed service providers prefer ThreatLocker to maintain network integrity by preventing malicious scripts and unauthorized access attempts. However, users identify room for growth in training and support flexibility, the interface, and certain technical challenges like network saturation from policy updates.
What are the most important features?Organizations utilize ThreatLocker for application allowlisting, ensuring only authorized software operates to prevent unauthorized access efficiently. Deployed across servers and workstations, its features support zero-trust principles and are favored by managed service providers for application management and network integrity.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.