

Trellix Network Detection and Response and ThreatLocker Zero Trust Platform compete in the cybersecurity space, specifically focusing on detection and response capabilities. Trellix may have an upper hand due to its robust threat detection and seamless tool integration.
Features: Trellix Network Detection and Response offers granular threat detection capabilities, intuitive real-time analysis, and effective system simulations. It integrates well with existing network tools, making it optimal for comprehensive security management. ThreatLocker Zero Trust Platform focuses on application allowlisting, sandbox testing, and elevation control. It provides robust endpoint protection, efficiently preventing unauthorized application executions, all while maintaining a lightweight performance.
Room for Improvement: Trellix Network Detection and Response could enhance its analytics, AI capabilities, and threat intelligence integration. Users have expressed a desire for better dashboard visibility and improved threat identification and containment actions. ThreatLocker Zero Trust Platform can improve identity verification, integrate better with SIEM tools, and develop a more cohesive mobile application. Users also suggest refining Learning Mode, addressing gaps in real-time notifications, and enhancing training modules.
Ease of Deployment and Customer Service:Trellix Network Detection and Response is typically deployed on-premises, adaptable to hybrid environments. Though customer service is responsive, users desire more immediate technical expertise. ThreatLocker Zero Trust Platform is flexible, installed across various deployments, including cloud models. It receives strong reviews for accessible and efficient customer support, bolstering deployment and user experience.
Pricing and ROI: Trellix Network Detection and Response has a higher cost, which may restrict smaller organizations. However, significant ROI is noted due to enhanced security and faster incident response times. ThreatLocker Zero Trust Platform has a clear, competitively priced model that offers good value. Its scalable solutions and inclusive support costs generate notable ROI, streamlining security management while lowering operational costs.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
Based on what we use ThreatLocker Zero Trust Endpoint Protection Platform for with the same functionalities and packaging, it was around 13 or 14 hours.
We have the MDR package as well, and just knowing someone is watching those endpoints at 3:00 a.m. is a lifesaver that you cannot put a dollar figure on.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
The customer support for Trellix Network Detection and Response is great.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
ThreatLocker Zero Trust Endpoint Protection Platform scales very smoothly with our growing needs.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
Controlling the cloud environment, not just endpoints, is crucial.
ThreatLocker Zero Trust Endpoint Protection Platform could improve by being a little more hands-off, perhaps by having a team inside ThreatLocker that does all the vetting of patches; having one person hired by ThreatLocker to check out patches means that a million other industries using ThreatLocker Zero Trust Endpoint Protection Platform do not have to vet the same patch, ultimately saving time and money around the world.
This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
Money is saved because it is not costly, and I would suggest it for other companies.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand.
| Product | Mindshare (%) |
|---|---|
| ThreatLocker Zero Trust Endpoint Protection Platform | 2.6% |
| Trellix Network Detection and Response | 3.5% |
| Other | 93.9% |


| Company Size | Count |
|---|---|
| Small Business | 51 |
| Midsize Enterprise | 13 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
ThreatLocker Zero Trust Platform employs a deny-by-default approach to enhance security and operational efficiency, focusing on precise application control and streamlined access management without administrative rights.
ThreatLocker Zero Trust Platform offers advanced application control, allowlisting, and elevation control, significantly reducing unauthorized software activities. Its granular controls improve security, while ringfencing enhances application monitoring. Elevation requests allow users to gain administrative access without IT intervention. The platform's ease of policy management and real-time threat visibility contribute to reduced help desk tickets and operational costs, ensuring protection against ransomware and unauthorized applications.
What are the key features of ThreatLocker Zero Trust Platform?Organizations often deploy ThreatLocker Zero Trust Platform for ensuring endpoint security in industries requiring stringent application control and administrative access management. Its functionalities are critical for managing Shadow IT, creating policies, and overseeing software installation approvals. Common usage spans sectors demanding robust security and compliance, such as finance and healthcare, where maintaining high security and efficiency is crucial.
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.