Try our new research platform with insights from 80,000+ expert users

ThreatLocker Zero Trust Endpoint Protection Platform vs WithSecure Elements Endpoint Protection comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 23, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ThreatLocker Zero Trust End...
Ranking in Endpoint Protection Platform (EPP)
6th
Average Rating
9.2
Reviews Sentiment
7.6
Number of Reviews
39
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (6th), Application Control (2nd), ZTNA (3rd), Ransomware Protection (3rd)
WithSecure Elements Endpoin...
Ranking in Endpoint Protection Platform (EPP)
51st
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 0.7%, down from 0.8% compared to the previous year. The mindshare of WithSecure Elements Endpoint Protection is 0.7%, down from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Johnathan Bodily - PeerSpot reviewer
Ensures ransomware protection and reduces phishing chaos
The application control has been great so far, and while I am still exploring the network access controls, I unfortunately don't have access to one module I would love to have due to licensing restrictions. It's easy to use in regard to reducing attack surfaces. For me, it's a piece of cake. We can have something approved within 30 seconds, thanks to the mobile app. We haven't eliminated security solutions. We just add to it, and ThreatLocker has been a great addition. We also have Kaseya and ThreatLocker as a supplement to that. It's useful. They have overlap, and we look at the overlap as a good thing. It's helped your organization save on operational costs or expenses by ensuring that many fewer hours are spent dealing with ransomware nonsense. I cannot count the amount of hours that I personally have not had to put in to recovering an environment from a ransomware event. The last big one took us about three weeks to completely recover from. Since we've grouped ThreatLocker in, the management of that whole setup has gone down to just daily help desk tasks and general server maintenance instead of having the whole system on fire. There are probably thousands of hours of saved time between our teams. It's been great so far. ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications is great. It's my biggest protection, the blocked applications. In a lot of cases, you go to install something yourself that you need for management, and it comes in and says, nope. And then I have to log into the portal and approve it. I get our other guys saying, hey, why are you trying to approve something? Any of the tools that I'm using on a day-to-day basis that haven't been in the environment during the whole learning mode initially, I could go through and set extensions and all that. So, while it's a headache on that end, the amount of saved time I can't even count. It is a little frustrating on my end since I like to go as quickly as I possibly can, and it slows me down. However, that's a really good thing. Depending on the site, it can save a lot of time and cut down headaches. It's likely saved a week's worth of time. It's cut down the amount of sever help desk tickets. Those have become minimal.
Muhammed Abdul Gafoor - PeerSpot reviewer
Has an easy initial setup process, but there could be more integration options
The initial setup is easy. I rate the process a seven or eight out of ten. We have LPR procurement. The deployment involves installing the product and adding a license. It takes three to four days to complete and requires a team of less than ten people to execute the process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution has made knowing and managing what is running on our clients' devices much easier for us. We know they cannot run what they are not supposed to run."
"Being able to protect and trust nothing by default, known as zero trust, is the most important feature to me."
"Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"ThreatLocker Zero Trust Endpoint Protection Platform provides no-sweat security that we can easily deploy. We do not worry about our habitual clickers because we receive an alert if they try to do something, and we know ThreatLocker has already taken care of it."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"The application whitelisting feature allows us to block and manage approved applications effectively. It ensures that no one can install an application on our systems unless it is approved by me, which is very efficient."
"The control list is the best feature. For our company, it provides value to our customers since they can see we are improving our security."
"Both incoming and outgoing traffic is protected."
"WithSecure Elements Endpoint Protection is good and easy to set up."
"The notifications and patch management features are valuable."
"There is a layer of security to prevent a malicious agent (malware) from interrupting or stopping services, deleting or modifying registry entries or even stopping the antivirus from acting, ensuring that there will be no interruption of protection."
"We use the product for detecting network vulnerabilities and for software update purposes."
"F-Secure is useful for keeping user machines up-to-date by pushing out security and critical updates."
"On the cloud management page, the solution scales up very highly."
"The most valuable features of WithSecure Elements Endpoint Protection are the clear useful portal and overall company protection."
 

Cons

"We identified several areas that we would like to see improved."
"The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
"The company should strive to stay ahead of all the developments happening externally. If their progress accelerates more rapidly than the ongoing changes outside, it would prove advantageous."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"It would be beneficial if it became more recognized in the EU to gain respect."
"Adding applications to the allowlist can sometimes feel overwhelming."
"Some reporting areas need improvement. We need to generate more reports."
"ThreatLocker University offers many good training modules, but more in-depth training for advanced platforms would be beneficial."
"There is no technical support available in the Middle East."
"But the biggest one for us is patch management because this has been our top priority when looking at alternatives. Every solution needs to have patch management, if that's possible. It would cut costs on our side if that feature were included, so we don't need to pay for two separate pieces of software."
"I would like the part of Hash Analysis by external sources to be improved."
"One problem is that the solution takes too much RAM from the client."
"The solution could improve by having more real-time responses. For example, when a license gets removed from a computer it does not update the records of the change. Additionally, when I installed Microsoft Windows Defender I was not able to send licenses through email to our tenants. The integration with other solutions could improve."
"Resource consumption is suboptimal and could be improved."
"The program and cloud service management is in English. It's not a problem for me, however, it might be for users who don't speak English or use it regularly."
"There could be a dedicated security partner with essential knowledge."
 

Pricing and Cost Advice

"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"The pricing is pretty fair, considering other solutions. Licensing-wise, it did not take long."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"The pricing is fair and there is no hard sell."
"We have not had any real issues with the pricing. As they have added more features, due to the way our contracts are structured with our customers, we have had to hold off on adopting the new features because they do add costs."
"The pricing works fine for me. It's very reasonably priced."
"ThreatLocker's pricing seems justifiable."
"The price is comparable."
"We pay a yearly licensing fee of about €20 per computer."
"If you purchase licenses in bulk the price of the licenses can decrease."
"The product has average pricing."
"The cost of the solution depends on the size of the company and where the licenses are being ordered from."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
36%
Retailer
8%
Financial Services Firm
5%
Manufacturing Company
5%
Computer Software Company
19%
Comms Service Provider
15%
Government
9%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
Pricing, setup costs, and licensing have been pretty accessible and manageable. It was not too expensive to get started, especially at a small scale for a smaller MSP. It is very accessible, easy t...
What needs improvement with ThreatLocker Allowlisting?
For the space that it's in, it's already there. I don't know of another product that compares to its level. Even recently, with the addition of the detect module is a very nice add-on to the packet...
What do you like most about F-Secure Protection Service for Business?
The notifications and patch management features are valuable.
What is your experience regarding pricing and costs for F-Secure Protection Service for Business?
The pricing is scalable. We can purchase more licenses if needed. It's a more cost-effective solution compared to Darktrace, which requires a special device purchase.
What needs improvement with F-Secure Protection Service for Business?
One problem is that the solution takes too much RAM from the client. It would help if it used less RAM in future versions.
 

Also Known As

Protect, Allowlisting, Network Control, Ringfencing
F-Secure Elements Endpoint Protection, F-Secure Protection Service for Business
 

Overview

Find out what your peers are saying about ThreatLocker Zero Trust Endpoint Protection Platform vs. WithSecure Elements Endpoint Protection and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.