


Symantec Endpoint Security Complete and ThreatLocker Zero Trust Platform are contenders in cybersecurity solutions. ThreatLocker has the advantage with its focus on seamless integration, user adaptability, and a proactive security posture.
Features: Symantec Endpoint Security Complete provides firewall protection, URL filtering, and the SONAR feature for real-time threat rejection. It also includes Adaptive Protection, which reduces the attack surface and supports application and device controls, threat-hunting capabilities, and advanced sandboxing. ThreatLocker Zero Trust Platform focuses on application allowlisting, elevation control, and network management, restricting unauthorized access and simplifying application and network rule management.
Room for Improvement: Symantec needs to address the complexity of its installation process, enhance EDR and XDR capabilities, and reduce its high-resource footprint. Meanwhile, ThreatLocker could benefit from improvements in identity management and better SIEM tool integration. Users also suggest easier automatic policy deployment and enhanced training resources.
Ease of Deployment and Customer Service: Symantec primarily supports on-premises and hybrid cloud deployment. However, customer service reviews are mixed regarding support efficiency. ThreatLocker supports public, private, and hybrid cloud deployments successfully, praised for its seamless setup and strong, efficient support. ThreatLocker’s proactive assistance during deployment is seen as a strength over Symantec.
Pricing and ROI: Symantec's pricing is often considered high, and its ROI is debatable. ThreatLocker offers a competitive, flexible pricing model, often providing significant value without hefty upfront costs. Many users find a satisfactory ROI due to improved security processes and a reduced need for multiple tools.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
Based on what we use ThreatLocker Zero Trust Endpoint Protection Platform for with the same functionalities and packaging, it was around 13 or 14 hours.
We have the MDR package as well, and just knowing someone is watching those endpoints at 3:00 a.m. is a lifesaver that you cannot put a dollar figure on.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
I don't know the current situation with Broadcom, however, it was good when I was involved.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
ThreatLocker Zero Trust Endpoint Protection Platform scales very smoothly with our growing needs.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
Mac OS upgrades would break them before new versions were available.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
The mobile device management was not unified with the other endpoint management, creating structural issues.
They could improve the user interface.
Controlling the cloud environment, not just endpoints, is crucial.
ThreatLocker Zero Trust Endpoint Protection Platform could improve by being a little more hands-off, perhaps by having a team inside ThreatLocker that does all the vetting of patches; having one person hired by ThreatLocker to check out patches means that a million other industries using ThreatLocker Zero Trust Endpoint Protection Platform do not have to vet the same patch, ultimately saving time and money around the world.
This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
Money is saved because it is not costly, and I would suggest it for other companies.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
I have both the antivirus and EDR features constantly, allowing my team's customers to conduct detailed analyses of where attacks have occurred or if any malicious files are present, which devices or files have been targeted.
Fortinet Endpoint Protection provides more features compared to other solutions.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| ThreatLocker Zero Trust Platform | 1.3% |
| Symantec Endpoint Security Complete | 0.7% |
| Other | 94.4% |



| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 5 |
| Large Enterprise | 7 |
| Company Size | Count |
|---|---|
| Small Business | 51 |
| Midsize Enterprise | 13 |
| Large Enterprise | 9 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Symantec Endpoint Security Complete offers robust defense capabilities including firewalls, advanced threat protection, and real-time SONAR monitoring to safeguard digital environments. This solution addresses virus outbreaks and reduces attack surfaces with a suite of advanced features.
With focus on comprehensive endpoint protection, Symantec Endpoint Security Complete is designed to detect, prevent, and respond to advanced cyber threats while maintaining minimal performance impact. It integrates various security measures such as sandboxing, threat hunting, EDR, and more, ensuring complete protection. Its deployment across different platforms is customizable, allowing adaptation to evolving security needs, from network security and secure messaging to Active Directory protection. Facilitating easy policy compliance and low administrative effort, this solution enhances cybersecurity readiness effectively.
What are the most important features of Symantec Endpoint Security Complete?In sectors such as finance and healthcare, Symantec Endpoint Security Complete plays a crucial role in safeguarding sensitive data and maintaining compliance. Retailers employ it to secure payment ecosystems, while educational institutions utilize its capabilities to protect against cyber threats in an increasingly digital learning environment. Its flexibility allows it to cater to varied industry requirements, ensuring reliable protection and efficient management of cybersecurity operations.
Gain proactive, industry leading Zero Trust cybersecurity capabilities with ThreatLocker. By employing a deny-by-default approach, you will greatly enhance your security and operational efficiency. Solutions from ThreatLocker are focused on precise application control and
streamlined access management without administrative rights.
ThreatLocker Application Control solutions include Zero Trust Alllowlisting, Zero Trust Ringfencing and Privilege Access Management, significantly reducing any unauthorized software activities in your environment. Granular controls improve your overall security, while ringfencing enhances application behavior monitoring. Elevation requests will allow users to gain administrative access without IT intervention. The platform's ease of policy management and real-time threat visibility contribute to reduced help desk tickets and operational costs, ensuring protection against ransomware and
unauthorized applications.
What are the key features of ThreatLocker Zero Trust Platform?
What benefits and ROI should users expect?
Organizations often deploy ThreatLocker to ensure endpoint security in industries requiring stringent application control and administrative access management. Its functionalities are critical for managing Shadow IT, creating policies, and overseeing software installation approvals. Common usage spans sectors demanding robust security and compliance, such as finance and healthcare, where maintaining high
security and efficiency is crucial.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.