ThreatLocker Zero Trust Endpoint Protection Platform offers robust endpoint security through application control and allowlisting, safeguarding servers and workstations from unauthorized software execution.
Product | Market Share (%) |
---|---|
ThreatLocker Zero Trust Endpoint Protection Platform | 0.9% |
Microsoft Defender for Endpoint | 10.0% |
CrowdStrike Falcon | 8.2% |
Other | 80.9% |
Type | Title | Date | |
---|---|---|---|
Category | Endpoint Protection Platform (EPP) | Sep 13, 2025 | Download |
Product | Reviews, tips, and advice from real users | Sep 13, 2025 | Download |
Comparison | ThreatLocker Zero Trust Endpoint Protection Platform vs Microsoft Defender for Endpoint | Sep 13, 2025 | Download |
Comparison | ThreatLocker Zero Trust Endpoint Protection Platform vs CrowdStrike Falcon | Sep 13, 2025 | Download |
Comparison | ThreatLocker Zero Trust Endpoint Protection Platform vs SentinelOne Singularity Complete | Sep 13, 2025 | Download |
Title | Rating | Mindshare | Recommending | |
---|---|---|---|---|
CrowdStrike Falcon | 4.3 | 8.2% | 97% | 135 interviewsAdd to research |
Microsoft Defender for Endpoint | 4.1 | 10.0% | 94% | 198 interviewsAdd to research |
Company Size | Count |
---|---|
Small Business | 29 |
Midsize Enterprise | 3 |
Large Enterprise | 3 |
Company Size | Count |
---|---|
Small Business | 311 |
Midsize Enterprise | 88 |
Large Enterprise | 239 |
ThreatLocker Zero Trust Endpoint Protection Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
What are the top features of ThreatLocker?ThreatLocker Zero Trust Endpoint Protection Platform is widely implemented to safeguard IT infrastructures against unauthorized access and application use. In sectors where data security is paramount, this platform enables users to prevent unauthorized software installations and control device applications, ensuring real-time threat prevention and compliance with industry regulations.
ThreatLocker Zero Trust Endpoint Protection Platform was previously known as Protect, Allowlisting, Network Control, Ringfencing.
Author info | Rating | Review Summary |
---|---|---|
Supervisor, Client Security at a consultancy with 11-50 employees | 4.5 | We have used ThreatLocker for five years, valuing its application control with ringfencing and elevation features. While improvements are interface-related, the return on investment is immense. ThreatLocker surpasses previous solutions in ease of management. |
Software admin at a mining and metals company with 1,001-5,000 employees | 5.0 | We use ThreatLocker as an endpoint protection platform primarily for elevation control and app management. It's cost-effective, user-friendly, and more reliable than previous solutions, though improved log visualization and permission hierarchy are needed. It saves us significant time and money. |
System Administrator at NMPP Energy | 4.5 | ThreatLocker Zero Trust Endpoint Protection excels at blocking unauthorized downloads and verifying application safety through its learning capability. It saves time and reduces shadow IT. Improvements in presentation technology and visibility at conferences are needed. |
COO at Panda Technology | 5.0 | I deploy ThreatLocker Zero Trust Endpoint Protection for application control, focusing on ring-fencing and elevation control. It empowers users and saves time, though improvements in cloud integrations are needed. The platform provides peace of mind as its main ROI. |
Director, Managed Services at a consultancy with 11-50 employees | 4.5 | I chose ThreatLocker for its effective application whitelisting and ringfencing features, despite a steep learning curve. It offers peace of mind for our clients and outperforms competitors by focusing solely on its strengths without overextending. |
Technical Engineer at Cloud 1 Solutions | 4.5 | I use ThreatLocker at both a bank and a trucking company to prevent ransomware. It efficiently controls applications, cutting down on security management time. Despite needing more built-in options, its return on investment is significant, making it highly recommendable. |
Senior System Administrator at Molders Group Limited | 4.0 | I work for an architecture firm, and we use ThreatLocker Protect to block unapproved applications, effectively combating unknown malware. The application whitelisting is user-friendly, but support response and stability need improvement. Our ROI with ThreatLocker is 20%. |
Information Cybersecurity Technology Specialist at Freez.it | 5.0 | I primarily use ThreatLocker on servers to prevent ransomware, finding it valuable for compliance by allowing only necessary applications. It saves time and costs, performing better than AppLocker as it’s easy to manage and reduces staffing needs. |