No more typing reviews! Try our Samantha, our new voice AI agent.
Abhishek Saini - PeerSpot reviewer
Professional Services Engineer at Next 7 it
Real User
Top 5
Feb 25, 2026
Zero trust controls have strengthened endpoint protection and simplify real-time app approvals
Pros and Cons
  • "Overall, ThreatLocker Zero Trust Endpoint Protection Platform has significantly strengthened our endpoint security by enforcing zero trust principles while maintaining operational flexibility and user productivity."
  • "I took off one point because sometimes it can be a bit complicated for new engineers, such as my teammates, especially for those who don't have hands-on experience."

What is our primary use case?

As the administrator for ThreatLocker Zero Trust Endpoint Protection Platform, I manage it, deploy it for new clients, and if someone installs an application that ThreatLocker stops, I have to allow that. So we can say I am the admin of ThreatLocker in my day-to-day life.

Once, one of our big clients in the US installed a new application, but it was stopped by ThreatLocker. They emailed me that their application was not working, and then I reviewed it. I took approval from their senior managers before allowing that application in their environment, and afterward, I approved it.

I just do daily tasks where I create policies for the applications they use. There are some generic applications which they use, so I create policies for them to ensure new users will not encounter issues. Sometimes, I have to approve applications, but I need to get approval from their manager or some senior engineer before real-time approval.

Ring-Fencing technology helps me day-to-day by monitoring application behavior. If it thinks the application is malicious or has code that shouldn't run in the environment, it stops that. For example, if an SQL application throws some codes, and if the application stops working, we need to check why it stopped, and then we can approve it if it's justified.

What is most valuable?

The best features of ThreatLocker Zero Trust Endpoint Protection Platform include a deny-by-default approach, ensuring only approved applications and processes can run, which significantly reduces attack surfaces. It provides granular application control that prevents ransomware, unauthorized scripts, and unknown executables from executing. It stops ransomware before executing, which greatly improves endpoint security, along with its unique Ring-Fencing technology that restricts application behavior and prevents trusted applications from being exploited maliciously. Additionally, it provides precise control over USB devices, external storage, and network shares to help prevent data exfiltration.

The easy policy management with a centralized dashboard makes it effortless for IT teams and engineers to manage policies, approval workflows, and endpoint visibility. The real-time approval system allows administrators to approve or deny applications instantly without disrupting endpoint user productivity. Strong visibility of audit logs offers detailed logs and reporting that help with compliance, forensic analysis, and security investigations. The lightweight endpoint performance impact means it operates effectively without noticeable system downtime compared to traditional antivirus solutions, making it a highly scalable platform ideal for MSPs and organizations managing multiple clients or distributed environments.

Overall, ThreatLocker Zero Trust Endpoint Protection Platform has significantly strengthened our endpoint security by enforcing zero trust principles while maintaining operational flexibility and user productivity.

ThreatLocker Zero Trust Endpoint Protection Platform has positively impacted my organization by preventing unknown applications from running in my environment. Many clients cannot run applications without our permissions, and I also have great control over the endpoints, enhancing both productivity and security.

After implementing ThreatLocker Zero Trust Endpoint Protection Platform, we have seen a productive impact, including significantly reduced security incidents. The deny-by-default approach drastically minimizes malware and unauthorized application incidents, which reduces emergency remediation efforts and results in less endpoint downtime. Systems experience fewer disruptions caused by ransomware, malicious scripts, or unwanted software installations, leading to improved uptime for the end user.

Faster troubleshooting and detailed logging allow us to quickly identify blocked processes or unauthorized behavior, significantly reducing troubleshooting time. The real-time approval feature enables our IT team to instantly approve legitimate applications, avoiding long user wait times while maintaining security. Our IT team spends less time handling infections or cleanup tasks and more time on proactive infrastructure improvements. Once policies are properly tuned, users can work without interruption while security remains tight, enforced in the background.

Overall, ThreatLocker Zero Trust Endpoint Protection Platform has shifted our environment from reactive incident handling to proactive security management, leading to a measurable reduction in downtime and support overload.

What needs improvement?

ThreatLocker Zero Trust Endpoint Protection Platform is already an optimized platform. I have a great experience with this, so I don't think anything needs to be improved.

There might be a small thing, but I would need to assess that further.

I took off one point because sometimes it can be a bit complicated for new engineers, such as my teammates, especially for those who don't have hands-on experience. They occasionally find it difficult to check application approvals. Overall, for me, it's good.

For how long have I used the solution?

I have been using ThreatLocker Zero Trust Endpoint Protection Platform for about three years and I am continuously using it.

Buyer's Guide
ThreatLocker Zero Trust Platform
April 2026
Learn what your peers think about ThreatLocker Zero Trust Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
892,487 professionals have used our research since 2012.

What do I think about the stability of the solution?

In my experience, ThreatLocker Zero Trust Endpoint Protection Platform is stable because we have not encountered any major crashes or reliability issues. The agent runs consistently in the background without causing system instability or performance degradation. Any operational challenges we experienced were mostly related to initial policy tuning or application allowing, which is expected when implementing a zero-trust model. Once policies were properly configured, the environment became very stable. Overall, I have not observed any unexpected agent crashes, minimal impact on endpoint performance, and consistent policy enforcement across devices. ThreatLocker Zero Trust Endpoint Protection Platform has proven to be a dependable and stable security solution for both daily operations and long-term endpoint protection.

What do I think about the scalability of the solution?

Regarding scalability, we have added new endpoints easily, as the policies were already made, and we just copied them to the new organization. So it's not a big deal.

How are customer service and support?

The customer support of ThreatLocker Zero Trust Endpoint Protection Platform is really quick, and they respond very promptly. I've had a good experience with them.

Which solution did I use previously and why did I switch?

We have eliminated CrowdStrike because we were using it for security purposes before we started using ThreatLocker Zero Trust Endpoint Protection Platform, which has proven to work for us.

We used CrowdStrike before ThreatLocker Zero Trust Endpoint Protection Platform and switched because CrowdStrike was complicated. There was also a significant security concern last year that led us to make the switch.

How was the initial setup?

My advice for organizations looking into using ThreatLocker Zero Trust Endpoint Protection Platform would be to plan the initial deployment and policy configuration carefully, especially during the early learning phase of adopting a zero-trust model. Since ThreatLocker Zero Trust Endpoint Protection Platform works on a deny-by-default approach, which is extremely powerful for security, organizations should start with learning mode and a staged deployment to understand application behavior.

It's essential to ensure the IT team receives proper training, as policy management and application approvals may feel complex for engineers new to zero trust. Define approval workflows in advance to avoid user disruption by gradually enforcing policies instead of applying strict controls immediately. Once properly configured, ThreatLocker Zero Trust Endpoint Protection Platform becomes a highly effective and low-maintenance security solution that significantly strengthens endpoint protection while maintaining productivity.

What was our ROI?

I haven't observed specific metrics regarding return on investment, but I am aware of the general impacts.

I haven't noticed any specific benefits in terms of saving time, reducing the need for extra staff, or seeing fewer security incidents since using ThreatLocker Zero Trust Endpoint Protection Platform, so I can't provide numbers.

Which other solutions did I evaluate?

Before choosing ThreatLocker Zero Trust Endpoint Protection Platform, we did not evaluate any other options.

What other advice do I have?

The allowlisting feature in ThreatLocker Zero Trust Endpoint Protection Platform effectively manages which software, scripts, and libraries run on our devices, as it provides excellent control while enforcing security measures.

I find the allowlisting feature easy to use, and it gives me enough control over which software, scripts, and libraries can run.

I can say it is easy to identify which security and configuration settings need fixing using the DAC dashboard; I would rate it a 10 out of 10 for me.

The efficiency of the real-time threat intelligence and category controls employed by web control is a big plus, as it helps ensure that we are dynamically protected even as new threats emerge.

I would rate this review nine out of ten overall.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Feb 25, 2026
Flag as inappropriate
PeerSpot user
reviewer2807097 - PeerSpot reviewer
Cyber Security Specialist at a government with 10,001+ employees
Real User
Mar 9, 2026
Zero trust controls have secured niche scientific apps and protect endpoints from obscure threats
Pros and Cons
  • "ThreatLocker's VDI environment, coupled with the ringfencing capabilities of policies, gives us confidence."
  • "We have had a few instances where the local database gets corrupted and starts blocking random Windows DLLs, and the support team has always been very quick at helping us identify and remediate that."

What is our primary use case?

My main use cases for ThreatLocker Zero Trust Endpoint Protection Platform are endpoint and server security. We have a lot of niche applications, many of which come from GitHub. ThreatLocker's ringfencing capabilities make us feel confident that if any of those niche, obscure applications were to be compromised, our endpoints would stay secure.

What is most valuable?

The features of ThreatLocker Zero Trust Endpoint Protection Platform that I have found most valuable include Application Control. We really appreciate the new DAST component of their Health Center and those vulnerability scans with results coming out.

The benefits of those features for my company are significant. My company has a lot of scientists using very specific applications that are not well-known, and VirusTotal has probably never inspected them before. ThreatLocker's VDI environment, coupled with the ringfencing capabilities of policies, gives us confidence.

My impression of ThreatLocker Zero Trust Endpoint Protection Platform's Allowlisting feature in terms of managing which software, scripts, and libraries run on my device is that it works great. We have lots of scripts that run on servers, and we use hash-based rules on them. If a user changes their script and does not let me know, their script will not run, which ensures I can review it. We have scientists who want random, obscure software to be installed, but it will not be installed even if the help desk agrees to assist with the installation until I approve it. This is a great all-around product.

I assess its impact on controlling the behavior of approved applications as very positive. It works really well, and I have nothing to add to that.

What needs improvement?

If I had one feature I would like added to ThreatLocker Zero Trust Endpoint Protection Platform, it would be the ability to clone a policy to a new machine. Right now, I have to manually clone it. If it is just a basic policy, its not a big deal. However, if there is one that is very specific with ringfencing rules and user-based rules, I do not have a way to just copy that to a new machine. I would either have to manually add all those same rules. That would be the one feature I think is needed.

For how long have I used the solution?

I have been using ThreatLocker Zero Trust Endpoint Protection Platform for one year.

What do I think about the stability of the solution?

My evaluation of the stability and reliability of ThreatLocker Zero Trust Endpoint Protection Platform is that the portal sometimes seems to crash. I can get logged in, but I cannot load anything and it will kick me out in about five minutes. There is no apparent pattern to it, and there is not a particular time when this happens. However, occasionally there are days where the portal has issues.

What do I think about the scalability of the solution?

I would assess how well ThreatLocker Zero Trust Endpoint Protection Platform scales with the growing needs of my company positively. We recently went through a replacement project of approximately 600 computers, and it went very smoothly. I did not hear any complaints about it.

How are customer service and support?

I would evaluate the customer service and technical support as great, with no complaints. They are all very responsive.

Which solution did I use previously and why did I switch?

I have not dropped any products since obtaining Threatlocker. Threatlocker is the most recent addition. I do not wish to disclose the other products I am using.

What was our ROI?

I would guess that ThreatLocker Zero Trust Endpoint Protection Platform has helped my company save on operational costs or expenses, but I would not be able to give specific numbers.

Which other solutions did I evaluate?

There was no other consideration in the evaluation process for another solution.

What other advice do I have?

By using ThreatLocker Zero Trust Endpoint Protection Platform, my company has an option now to eliminate or consolidate any security tools or solutions. We could get rid of a couple of things, but we have not gone down that path.

The reason we have not gone down that path is because we are in contracts with quite a few things right now.

Regarding the Network Control feature, we are still in audit mode. We have it purchased but have not enabled it.

For Elevation Control, we use that for a few things. Our developers do web app development, and if they need to debug, it opens in IIS, which is an admin-level feature. Elevation Control lets us automatically elevate Visual Studio, which is really useful there. We were able to get rid of admin accounts for that by using Elevation Control.

Concerning the Storage Control feature, we are still starting to use it.

I am using the DAST dashboard and we are reviewing it. We have enabled some policies based off of its recommendations.

Identifying which security and configuration settings need fixing using the DAST dashboard is pretty good at outlining what needs to happen. There have been some quirks. I understand it is still in its infancy. There are some quirks with its actual reporting. There was a period where it was saying we were 100% secured, and then a week later it showed we had a bunch of vulnerabilities. We are not fully relying on it, but as far as presenting vulnerabilities it has found and where to go to change things, it is pretty easy to understand.

I would rate this review overall as a 10.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 9, 2026
Flag as inappropriate
PeerSpot user
Buyer's Guide
ThreatLocker Zero Trust Platform
April 2026
Learn what your peers think about ThreatLocker Zero Trust Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
892,487 professionals have used our research since 2012.
Cyber Security Analyst at SCOUT ENERGY MANAGEMENT, LLC
Real User
Mar 5, 2026
Zero trust controls have stopped ransomware attempts and protect endpoints from untrusted apps
Pros and Cons
  • "ThreatLocker Zero Trust Endpoint Protection Platform has definitely saved us on operational costs and expenses by preventing incidents."
  • "ThreatLocker Zero Trust Endpoint Protection Platform should focus more on the application allow listing feature, which shows whether a program has been recognized but not necessarily whether it has been trusted."

What is our primary use case?

My main use cases for ThreatLocker Zero Trust Endpoint Protection Platform are Application Control and Endpoint Protection.

What is most valuable?

The feature I like the most about ThreatLocker Zero Trust Endpoint Protection Platform is Application Control. It keeps things secure by ensuring only trusted programs run, and it does not matter that the user has local admin because they cannot run untrusted software.

ThreatLocker Zero Trust Endpoint Protection Platform benefits my company by preventing serious incidents. A few months ago, someone called one of our users and pretended to be helpdesk. They remoted into their computer and tried to run Node.js. The hackers could not get it to run. They tried several times and even sent me a ThreatLocker request for it, which is how I found out about the attempted compromise. I was wondering why this person was running a script. I called them up and discovered what was going on. I told them to hang up immediately. The attackers were not able to run anything. They tried PowerShell and command prompt, but nothing worked.

What needs improvement?

ThreatLocker Zero Trust Endpoint Protection Platform should focus more on the application allow listing feature, which shows whether a program has been recognized but not necessarily whether it has been trusted. It would be helpful to have categorization to let me know which programs are not trustworthy. For example, GoToMeeting is a known screen sharing program that shows as high risk, but that does not necessarily mean it is not trustworthy. A little more clarification on that would be beneficial.

For how long have I used the solution?

I have been using ThreatLocker Zero Trust Endpoint Protection Platform for two years.

What do I think about the stability of the solution?

There were some concerns about the stability and reliability of ThreatLocker Zero Trust Endpoint Protection Platform regarding memory usage, but we found that the concerns were out of proportion. I think we probably need more communication on our IT front because whenever something glitches, people would assume it is ThreatLocker. We would investigate and see that ThreatLocker is not blocking anything and the issue is something else. A little more transparency would be beneficial.

What do I think about the scalability of the solution?

ThreatLocker Zero Trust Endpoint Protection Platform scales well with the growing needs of my company. At first, we deployed it to normal laptops. Then we expanded to developer laptops and our technicians because they need more programs. This year, we are going to expand to servers that are mission critical in our company. We want to make sure nothing gets blocked, so we are taking our time with those. We do a lot of turnover with laptops because we buy and sell assets, and it has scaled very well with that. I have not had any issues integrating new laptops or decommissioning old ones.

How are customer service and support?

I evaluate the customer service and technical support of ThreatLocker Zero Trust Endpoint Protection Platform as very good. They are very responsive. I am able to get in touch with a chat person usually within a minute.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before adopting ThreatLocker Zero Trust Endpoint Protection Platform, we did not have a platform like this.

What was our ROI?

ThreatLocker Zero Trust Endpoint Protection Platform has definitely saved us on operational costs and expenses by preventing incidents. The one I mentioned before involved an attempted ransomware infection. It has saved us on two other occasions besides that. Talking to our CIO, he said that ThreatLocker more than paid for itself during those incidents.

Which other solutions did I evaluate?

The other solutions that came under consideration in our process include ConnectWise for scripting and patching. We also have SentinelOne for detection. For endpoint elevation and control, we were looking for a solution and ThreatLocker was really the only one that met our needs.

What other advice do I have?

I have used the Ringfencing feature.

The Ringfencing feature of ThreatLocker Zero Trust Endpoint Protection Platform impacts controlling the behavior of approved applications positively. Ringfencing keeps programs that are potentially running as admin, and they might need to run as admin, but it does not give that admin access to other programs. We are able to limit them from talking to the internet. It gives us a lot of peace of mind.

We do not use the Network Control feature.

I do use the Elevation Control feature.

The Elevation Control feature of ThreatLocker Zero Trust Endpoint Protection Platform facilitates just-in-time administrative access for approved applications effectively. We used to have every user as a local admin on their machine because some programs had to run as admin. This feature lets us run just that program without having to elevate the whole machine. So it is much safer.

We do not use the Storage Control feature.

I have used the DAC Dashboard.

Identifying which security and configuration settings need fixing using the DAC Dashboard is very easy. It shows you right there on the home screen without having to do an extra scan. There is nothing you have to configure for it to work. It shows you the top vulnerabilities right there.

We do not use the Web Control feature.

I give ThreatLocker Zero Trust Endpoint Protection Platform an overall rating of 10 out of 10. It works perfectly for what we use it for.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 5, 2026
Flag as inappropriate
PeerSpot user
IT Security Analyst at Bank Of Philadelphia
Real User
Mar 5, 2026
Application allow-listing has protected our bank while responsive support manages every request
Pros and Cons
  • "As for the customer service and technical support of ThreatLocker Zero Trust Endpoint Protection Platform, I would rate them from one to 10 as a 20."

    What is our primary use case?

    My main use case for ThreatLocker Zero Trust Endpoint Protection Platform is Application Whitelisting.

    What is most valuable?

    The features of ThreatLocker Zero Trust Endpoint Protection Platform that I like the most is the Application Whitelist, which is mostly what I use, but their customer service is the best of the best. I deal with over 100 vendors. I'm over vendor management for the bank, and I never dread a call with ThreatLocker, with Andrew and Jordan. They're pros. They're so helpful and understanding and they're the best, out of any company. Their customer service is number one, without a doubt.

    I'm just overall impressed with the solution's allow-listing feature in ThreatLocker Zero Trust Endpoint Protection Platform. Being relatively new to IT, but not technology, it was a feature that I didn't know existed. Obviously it makes sense that it's needed, but the capabilities and how much it can protect you on the end, it's not surprising how useful it is.

    The customer service features of ThreatLocker Zero Trust Endpoint Protection Platform just make everything so easy. I can pick up the phone and call them or set up a Zoom call. There's no question too dumb or that I feel stupid for asking. They're responsive and on top of it. Most of the time, I can email Andrew about an issue and he'll schedule a call and have it fixed before we even have a call. He goes through and tells me what he did, and then he actively monitors the situation or policy, even after the call, just to ensure we don't have any problems, and we just don't get that anywhere else. It's amazing.

    What needs improvement?

    Nothing comes to mind regarding how ThreatLocker Zero Trust Endpoint Protection Platform can be improved. I would suggest keeping customer service up and the Application Whitelist feature, which is what I primarily use, just keep advancing in that. Perhaps make some of it a little more user-friendly as far as the interface because it can get confusing at times, but the customer service makes up for any confusion or doubts within myself because I know that it's going to get done right and it's going to protect the bank as much as possible.

    For how long have I used the solution?

    I have been using ThreatLocker Zero Trust Endpoint Protection Platform for one year since April 1st. The organization onboarded ThreatLocker about six months prior to me, before I joined. We're still kind of starting to get everything, our Ringfencing and all our policies, starting to get them all ironed out now, but we really enjoy it.

    What do I think about the stability of the solution?

    The stability and reliability of ThreatLocker Zero Trust Endpoint Protection Platform have been great. We haven't had any issues. I can't think of one time where it's been down or caused any internal conflicts.

    What do I think about the scalability of the solution?

    From my understanding, regarding the scalability of ThreatLocker Zero Trust Endpoint Protection Platform, we pretty much set it company-wide and it's been a smooth process with Andrew helping us along the way, working with my supervisor, the ISO. We jumped in, and he was still in the learning phase when I joined on April 1st, but he pretty much figured it out. Through the help of the Cyber Heroes and the customer support, we've been rocking and rolling with it and are confident. It's been great.

    How are customer service and support?

    If you have any issues or questions, the support team is right there at a drop of a hat, with no questions asked. The team will help you and walk you through it. As for the customer service and technical support of ThreatLocker Zero Trust Endpoint Protection Platform, I would rate them from one to 10 as a 20. They're great, fantastic.

    How would you rate customer service and support?

    Positive

    What was our ROI?

    As far as operational expenses, ThreatLocker Zero Trust Endpoint Protection Platform has not helped my company save money; however, it helps us sleep at night knowing that our company and our customers' financials are protected, just by making sure that we don't have any vulnerabilities through bad actors and applications.

    What other advice do I have?

    I'm in charge of information security when using ThreatLocker Zero Trust Endpoint Protection Platform. Whenever any employee tries to download or install any application on any work device, it sends a notification directly to me, and then I have to approve or reject the request and set up policies and Ringfences to make sure that if we approve the product, it doesn't come up flagged or get kicked or ask for permission under certain circumstances. We can also change the groups with different departments if they need access to certain applications. I approve installations of software and programs.

    I have used the Ringfencing feature in ThreatLocker Zero Trust Endpoint Protection Platform. I assess the impact of the Ringfencing feature on controlling the behavior of approved applications as really helpful, as far as elevating certain things, setting up policies, and fine-tuning. It may not be so much about the application; it's about who's accessing it and where it's going and who installs it. It's been really helpful as far as the elevation of said application.

    We're working on implementing the Network Control features of ThreatLocker Zero Trust Endpoint Protection Platform. We haven't really deep-dived into it, but we have a call set up with Andrew and Jordan next week to deep-dive into that and try to start implementing it because it's very well needed.

    I do not use the Elevation Control feature in ThreatLocker Zero Trust Endpoint Protection Platform a whole lot, but I've worked with Andrew and he's walked me through some things where we've had issues.

    I'm not familiar with the Storage Control feature of ThreatLocker Zero Trust Endpoint Protection Platform when it comes to enforcing policy-driven access over various systems.

    It's pretty self-explanatory to identify which security and configuration settings need fixing using the DAC dashboard of ThreatLocker Zero Trust Endpoint Protection Platform. It has a lot of nice graphs and charts and explanations for everything. It's very helpful. I like the new dashboard.

    We don't use ThreatLocker Zero Trust Endpoint Protection Platform for blocking site control and other content filtering that I'm aware of.

    I would rate ThreatLocker Zero Trust Endpoint Protection Platform as fantastic, 10 out of 10. I'd highly recommend them. It's a great platform. It's fairly simple to use, and if you have any questions, customer service is just top-notch. Make the jump. It'll be worth it.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Mar 5, 2026
    Flag as inappropriate
    PeerSpot user
    Jacob Turner - PeerSpot reviewer
    Network Engineer at OneconnectionIT
    Real User
    Top 10
    Oct 7, 2025
    Has unified multiple security tools and provided confidence with strong endpoint control
    Pros and Cons
    • "The single pane of glass management for all this functionality is really the best feature, as it unifies many utilities that would have been separate costs before and lets us sleep at night knowing that things are being monitored 24 hours."
    • "It's very annoying to uninstall. You have to go into the online control panel and disable tampering for a device before it'll let you uninstall it without complaining really loudly."

    What is our primary use case?

    We're a managed service provider, mostly dealing with small business office environments, so ThreatLocker Zero Trust Endpoint Protection Platform is used in the context of many different tools. It's a unification of several different tools. Their front and center is their Application Control, where I believe the older, less correct name for it would be application whitelisting. Basically, it ensures that nothing can run within a given environment. As long as the machine is protected by ThreatLocker Zero Trust Endpoint Protection Platform, nothing can run within an environment that is not considered kosher by the admin.

    If you don't allow it, it doesn't run with ThreatLocker Zero Trust Endpoint Protection Platform. It's as simple as that. I've had it block PowerShell scripts that my RMM has sent through. It's one of those things that in the moment, it's really annoying. However, the implication is that if that were anybody else, they wouldn't have been able to allow it.

    What is most valuable?

    I deal with ThreatLocker Zero Trust Endpoint Protection Platform. It provides peace of mind because it unifies a lot of different tools, including managed detection and response and Endpoint Detection and Response.

    The single pane of glass management for all this functionality is really the best feature. It unifies many utilities that would have been separate costs before, and it lets us sleep at night knowing that things are being monitored 24 hours.

    The ThreatLocker Zero Trust Endpoint Protection Platform auditing capabilities have provided valuable insights for us and have stopped several would-be malware infections.

    What needs improvement?

    Going with the theme of ThreatLocker Zero Trust Endpoint Protection Platform being a one-stop shop where they have just about everything, and they have a really good product stack as is. However, the one last thing I would want to see is mail security implemented similar to how Mail Protector does theirs, except obviously managed and included in a subscription tier with ThreatLocker Zero Trust Endpoint Protection Platform.

    It's pretty easy to deploy as far as this functionality goes. However, it's very annoying to uninstall. You have to go into the online control panel and disable tampering for a device before it'll let you uninstall it without complaining really loudly. This is actually one of those things that is annoying in day-to-day operation because it assumes you don't know what you're doing. However, I would rather it let me know when it doesn't need to than have a situation where our protection is just being disabled and nothing's being done about it.

    On a scale of 1 to 10, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a nine. There's a little bit of smoothing they could do, but most of my annoyances with it are with the concept as a whole and there's not really anything anyone can do to fix them. It comes with the territory. It's not really something that they in particular could improve upon.

    For how long have I used the solution?

    I have dealt with ThreatLocker Zero Trust Endpoint Protection Platform for a couple of years at this point.

    How are customer service and support?

    The support with ThreatLocker Zero Trust Endpoint Protection Platform is phenomenal. Utterly phenomenal. I literally don't think I have ever waited more than a minute to hear back.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We've been Blackpoint customers for MDR, EDR before ThreatLocker Zero Trust Endpoint Protection Platform. They did not offer the Application Control or the network control, the storage control. ThreatLocker Zero Trust Endpoint Protection Platform added the MDR, EDR functionality as a logical extension of what they do with the application whitelisting, with the network control, with the storage control. It was just a logical extension. But Blackpoint only ever offered the MDR, EDR functionality. And as far as I know, they were only just starting to branch out into Application Control before we moved over to ThreatLocker Zero Trust Endpoint Protection Platform.

    What other advice do I have?

    The zero-trust approach of ThreatLocker Zero Trust Endpoint Protection Platform has helped us pass certain certifications for cybersecurity. The zero-trust portion means that it's a little more annoying than traditional security software. However, you know for a fact that it's working because you can watch it stop stuff in real-time.

    I do use the Application Control feature of ThreatLocker Zero Trust Endpoint Protection Platform. It is about as straightforward as you could hope for a tool. They offer many deployment options. They have an agent installer you can download. They have a deployment script that you can push through your RMM, or through a Group Policy type implementation.

    I'm not very familiar with the pricing of ThreatLocker Zero Trust Endpoint Protection Platform. I don't look at the numbers typically as I focus on technological aspects and implementation. From what I understand, our licensing costs are actually fairly reasonable. For the tier we're at now, it's approximately $10 an endpoint, and we're easily able to upsell that. We're covering our costs and then a little bit on top. It's such a useful tool that if I were making the decision, I would probably even sell it at a loss and take a little bit of a chunk out of other managed service profit margins if necessary. ThreatLocker Zero Trust Endpoint Protection Platform is just that useful.

    The way Ringfencing helps limit application actions is by allowing an application to run. However, that application is not allowed to talk to certain common threat vectors such as scripting hosts, PowerShell, macros, etc. That's how it's configured by default. You can configure it however you want. For example, I could stop Chrome from talking to Word if needed.

    I rate ThreatLocker Zero Trust Endpoint Protection Platform a nine out of ten.

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Oct 7, 2025
    Flag as inappropriate
    PeerSpot user
    Server Administrator at Clay County Sheriff's Office
    Real User
    Mar 4, 2026
    Zero trust controls have strengthened endpoint security and simplified evidence handling
    Pros and Cons
    • "Overall, ThreatLocker Zero Trust Endpoint Protection Platform is an ideal solution for any company lacking comparable protection, offering complete visibility into the environment, making it a recommended choice for every organization with computer systems in place."
    • "Identifying which security and configuration settings need fixing using the DAC dashboard is somewhat difficult at times."

    What is our primary use case?

    As a sheriff's department, our main use cases for ThreatLocker Zero Trust Endpoint Protection Platform involve managing many different endpoints that are our deputies on the road who constantly receive evidence, encompassing various file types, including video files in executable form from banks and ATMs, necessitating careful monitoring of executions.

    Additionally, we have a finance department that faces constant phishing attacks, and the platform helps us gain better control over what is executed in our environment. When something is executed, we can pause to assess its necessity.

    How has it helped my organization?

    By using ThreatLocker Zero Trust Endpoint Protection Platform, we have been able to consolidate several security tools, including considering removing SentinelOne to streamline everything under ThreatLocker and ThreatLocker Detect to minimize device overhead. Previously, we encountered conflicts between tools, but transitioning entirely to ThreatLocker has been satisfying as it effectively prevents threats.

    What is most valuable?

    For us, the features we appreciate most about ThreatLocker Zero Trust Endpoint Protection Platform are the learning mode, maintenance modes, and installation modes which we utilize heavily. We do not allow new applications to be executed in our environment, so we maintain an approved list of applications. The learning mode enables us to learn these applications initially, thus preventing the launch of anything else. If an unapproved application attempts to launch, it prompts a conversation about its necessity, often revealing that we might already have a similar tool we can use. The maintenance mode is indispensable for us.

    My impression of the allow-listing feature of ThreatLocker Zero Trust Endpoint Protection Platform is positive; it is convenient that for widely used applications such as Adobe, we do not have to learn each individual application as we can simply allow the entire suite, ensuring all updates and applications are included. This feature helps us establish a static baseline of safe items to ensure familiarity within our finance department and other teams.

    I have used the ringfencing feature of ThreatLocker Zero Trust Endpoint Protection Platform.

    I assess the impact of ThreatLocker Zero Trust Endpoint Protection Platform on controlling the behavior of approved applications as beneficial; for example, with our CAD program, there is no need for outside applications to interface with it. This ringfencing capability allows us to monitor any unauthorized interaction attempts with our applications, providing intensive oversight of their behavior.

    Regarding the network control feature of ThreatLocker Zero Trust Endpoint Protection Platform, I do not use it extensively; we mainly rely on our network firewall since all our clients are connected through a VPN. However, I am actively learning about the features and plan to advocate for increased usage as I recognize we are under-utilizing this aspect.

    I do use the elevation control feature of ThreatLocker Zero Trust Endpoint Protection Platform.

    My assessment of how ThreatLocker Zero Trust Endpoint Protection Platform facilitates just-in-time administrative access for approved applications is quite favorable; for instance, one of our applications requires admin access for initial launches or periodically to download new map files. This application can be set to launch as an admin automatically, alleviating recurring issues.

    ThreatLocker Zero Trust Endpoint Protection Platform helps us save on operational costs and expenses, particularly concerning application management since it enables us to verify applications efficiently. Before, we often had to backtrack and resolve issues created by unverified installations, which has transitioned to a more proactive stance against vulnerabilities.

    What needs improvement?

    Identifying which security and configuration settings need fixing using the DAC dashboard is somewhat difficult at times. Initially, we encountered challenges when launching applications for the first time due to denials, requiring a detailed investigation. However, I have found that there is a more effective approach available in the panel for this purpose; nonetheless, I still struggle to pinpoint the exact reasons for certain denials and the policies causing them.

    To improve ThreatLocker Zero Trust Endpoint Protection Platform, it would be beneficial to integrate a notification feature with the learning mode that clearly indicates items learned during a session. This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.

    For how long have I used the solution?

    We have been using ThreatLocker Zero Trust Endpoint Protection Platform for a little over a year now.

    What do I think about the stability of the solution?

    I assess the stability and reliability of ThreatLocker Zero Trust Endpoint Protection Platform as excellent; in the entire time we have had it, there was only one occasion where it crashed, necessitating a reinstall. Given the scale of our operations managing a thousand installations, this performance is impressive.

    What do I think about the scalability of the solution?

    ThreatLocker Zero Trust Endpoint Protection Platform scales well with our company's growing needs; as we continuously hire new deputies and add servers, the installation process is smooth and easy when the right server or workstation applications are designated for installation.

    How are customer service and support?

    My experience with the customer service and technical support for ThreatLocker Zero Trust Endpoint Protection Platform is positive; they are responsive and readily available. We manage through our MSP, which facilitates direct communication during troubleshooting, making it easy to connect when issues arise. I would rate the support at a ten as I have never faced any problems.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Prior to using ThreatLocker Zero Trust Endpoint Protection Platform, we were utilizing SentinelOne.

    How was the initial setup?

    My experience with pricing, setup cost, and licensing for ThreatLocker Zero Trust Endpoint Protection Platform is that the setup process is straightforward. While I do not know the specifics of our financial arrangement because our finance department manages that, we focus on securing multiple vendor quotes as part of our internal procedures. The initial learning phase took about a month or two, establishing a baseline across our machines, and after that, it became an effortless operation.

    What about the implementation team?

    We manage through our MSP, which facilitates direct communication during troubleshooting, making it easy to connect when issues arise.

    What's my experience with pricing, setup cost, and licensing?

    Quantifying the exact savings ThreatLocker Zero Trust Endpoint Protection Platform provides is challenging, but I estimate it saves us at least a couple of hours a week through streamlined auditing processes rather than the manual effort previously required.

    Which other solutions did I evaluate?

    There are no other solutions I am aware of that address similar needs outside of ThreatLocker Zero Trust Endpoint Protection Platform. I believe we considered a couple of other solutions during our decision-making process, but I cannot recall their names now.

    What other advice do I have?

    Overall, I would give ThreatLocker Zero Trust Endpoint Protection Platform a rating of ten out of ten. It is an ideal solution for any company lacking comparable protection, offering complete visibility into the environment, making it a recommended choice for every organization with computer systems in place. I have not used the storage control feature of ThreatLocker Zero Trust Endpoint Protection Platform until recently; I finally got it turned on today. We plan to implement it, especially since we frequently receive various USBs as evidence in law enforcement, allowing us to issue specific USBs that individuals can use safely without risking unknown data from random devices.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Mar 4, 2026
    Flag as inappropriate
    PeerSpot user
    IT Coordinator at Tech Rockstars
    Real User
    Mar 4, 2026
    Zero trust controls have simplified antivirus management and protect outdated dental systems
    Pros and Cons
    • "Zero-Touch is the future, and ThreatLocker Zero Trust Endpoint Protection Platform is the easiest way to accomplish that."
    • "I actually have a gripe with the allowlisting feature of ThreatLocker Zero Trust Endpoint Protection Platform."

    What is our primary use case?

    We're using ThreatLocker Zero Trust Endpoint Protection Platform primarily as our antivirus to restrict access. We provide our employees with the programs they need to use, and then we ensure that anything not running is not allowed to run.

    Many dental places use scanners that are two or three generations too old with software that only runs on Windows 7, so Ringfencing from ThreatLocker Zero Trust Endpoint Protection Platform is perfect for that. It allows us to have a computer on the network that has many potential vulnerabilities, but we are able to prevent any unauthorized activity.

    By using ThreatLocker Zero Trust Endpoint Protection Platform, we're using it as our primary antivirus, so we're not using things such as Bitdefender or anything else that we might suggest. We are just using ThreatLocker as our primary for that.

    What is most valuable?

    Personally, I really think the Ringfencing feature of ThreatLocker Zero Trust Endpoint Protection Platform is really cool. I think allowing yourself to run more antiquated, obsolete things through Ringfencing is really powerful, especially with companies who want to be cost-effective.

    Ringfencing allows us to do exactly what we need and nothing more. That is exactly what we want with these more obsolete devices that we are Ringfencing.

    The Elevation Control feature of ThreatLocker Zero Trust Endpoint Protection Platform is one that we use quite often, and I think it's also something that really speeds up a lot of our day-to-day work by being able to quickly say we will elevate this and then we will go on about our day.

    I would say the Elevation Control feature really improved our process because it prevents our users from needing to call us or write us and wait on hold for ten or so minutes to request elevation. They will send in the request, we will get an email or it will pop up on the elevation dashboard, and it is as easy as clicking and going.

    What needs improvement?

    I actually have a gripe with the allowlisting feature of ThreatLocker Zero Trust Endpoint Protection Platform. When updating software, it is a little inconvenient. Many users actually tend to have an issue, and I have spoken with other people here at the ThreatLocker event as well, where that is the main issue coming from the user end in that they want to install something and install it immediately without having to ask anybody. However, I feel that might be a necessary evil in order to have everything secure, as we do not want them accidentally running ransomware or something similar.

    Primarily, we have different VPN services, but we are trying to slowly integrate some of the VPN features of ThreatLocker Zero Trust Endpoint Protection Platform. We are having a little trouble with that integration, specifically with the Network Control.

    For how long have I used the solution?

    We had ThreatLocker Zero Trust Endpoint Protection Platform in place at our company as soon as I started working here, approximately a year ago.

    How are customer service and support?

    I use the help center on ThreatLocker portal quite often, and they are usually very responsive, which I think is really impressive.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We do not need those tools anymore as we use ThreatLocker Zero Trust Endpoint Protection Platform as a replacement.

    What other advice do I have?

    Personally, I think ThreatLocker Zero Trust Endpoint Protection Platform is fine the way it is. I have no big complaints with it. I would say maybe the education on it could be a little clearer. I know they have a bootcamp and an exam for that, and you can also take that online. They also have the help center available. ThreatLocker is pretty squared away in my opinion.

    We are running a pretty lean setup, so ThreatLocker Zero Trust Endpoint Protection Platform allows us to have an overview of all the computers that we are managing at one time, which is very helpful in that way.

    We are a small company of less than fifteen people managing around seventy different clients, all with a varying amount of computers from five computers to almost twenty. I would say that ThreatLocker Zero Trust Endpoint Protection Platform has not impeded any of that. It is definitely usually the smoothest part of the process to get ThreatLocker enabled.

    There is a lot of overhead when you are running a bunch of antiviruses with personal users having their own things they want to run, but if we have ThreatLocker, we can tell them that we know everything that is going on. We do not really need to have any of this that is causing additional overhead on your computer.

    Zero-Touch is the future, and ThreatLocker Zero Trust Endpoint Protection Platform is the easiest way to accomplish that. If you already have Zero-Touch in place, then that is fine, but if you want it to be easy and scalable, ThreatLocker is the way to do it. I would give ThreatLocker Zero Trust Endpoint Protection Platform a rating of ten out of ten, as this is probably the easiest way to implement IT for any company and any IT security is through ThreatLocker.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Mar 4, 2026
    Flag as inappropriate
    PeerSpot user
    IT Admin at a non-tech company with 11-50 employees
    Real User
    Mar 5, 2026
    Zero trust controls have simplified admin removal and now streamline secure software installs
    Pros and Cons
    • "We have gotten a lot of use out of the feature of removing local admins from a lot of computers with ThreatLocker Zero Trust Endpoint Protection Platform."
    • "At the time, ThreatLocker does not have a great way to do that; you have to make separate groups."

    What is our primary use case?

    We use Application Control with ThreatLocker Zero Trust Endpoint Protection Platform, and we have started to use Network Control a little bit. Elevation Control is the main feature we have gotten use out of.

    One of the things we have discussed with our solutions engineer at ThreatLocker is that we are trying to do nested groups. At the time, ThreatLocker does not have a great way to do that; you have to make separate groups. They said that is already in the works, so I do not know if that is helpful, but that is the main thing.

    How has it helped my organization?

    We have gotten a lot of use out of the feature of removing local admins from a lot of computers with ThreatLocker Zero Trust Endpoint Protection Platform. Our company is spread out, so we cannot usually get hands-on those computers. It is a lot easier to hit the button on ThreatLocker Zero Trust Endpoint Protection Platform and remove it and also just get an audit of whether there are any other local admins floating out there. That has been really helpful. The testing environment has been very helpful as well.

    We did not have any testing environment previously to using ThreatLocker Zero Trust Endpoint Protection Platform, so it was us as IT admins doing our best to test software before deploying it out to the users. That helps a lot.

    I assess its role in facilitating just-in-time administrative access for approved applications with ThreatLocker Zero Trust Endpoint Protection Platform as very helpful in allowing a user to install software, so we do not have to actually remote in and put our credentials. We can give them an hour to install the software, monitor their machine, make sure it is all safe, and they are good to go after that. It helps us save a lot of time.

    I find the Storage Control feature in ThreatLocker Zero Trust Endpoint Protection Platform to be very helpful when it comes to enforcing policy-driven access over various storage devices. We are trying to get into CMMC, which is a compliance certification; one of the requirements is to inventory any USB devices that we have floating around the company. With ThreatLocker Zero Trust Endpoint Protection Platform, we are able to name those devices, record their serial number and everything, and who they are assigned to. We have visibility into that, and it is very helpful.

    What is most valuable?

    The allow-listing feature in ThreatLocker Zero Trust Endpoint Protection Platform is very helpful for managing which software, scripts, and libraries run on my device. It is obviously a lot better than trying to blocklist specific things. We can only allow the things that we want in the environment.

    I have used the Ringfencing feature in ThreatLocker Zero Trust Endpoint Protection Platform.

    I assess its impact on controlling the behavior of approved applications with ThreatLocker Zero Trust Endpoint Protection Platform as working well to me. I am not super deep into it as far as how we are designing the Ringfencing, what we are blocking, and what we are allowing, but from what I can tell, it is helpful.

    We have gotten a lot of use out of Elevation Control feature in ThreatLocker Zero Trust Endpoint Protection Platform.

    What needs improvement?

    I do not believe we have started eliminating anything with ThreatLocker Zero Trust Endpoint Protection Platform; it is just an add-on for us right now.

    We have not gotten too deep into blocking things on the network with ThreatLocker Zero Trust Endpoint Protection Platform. We do have RDP blocked on user endpoints now, so that is helpful for sure.

    I have not yet used the DAC dashboard.

    I do not know if we are actually using the real-time threat intelligence category controls employed by web control in blocking malicious and non-compliant sites.

    For how long have I used the solution?

    We got ThreatLocker Zero Trust Endpoint Protection Platform about a year ago.

    What do I think about the stability of the solution?

    ThreatLocker Zero Trust Endpoint Protection Platform has been pretty solid in terms of stability and reliability. There is one slight issue we have run into where the testing environment sometimes is not available, but they do provide updates and emails. Nothing is going to have perfect 99.999% uptime, so that is understandable. But that is really the only hiccup we have had.

    What do I think about the scalability of the solution?

    As far as I know, ThreatLocker Zero Trust Endpoint Protection Platform has scaled pretty smoothly with the growing needs of my company; we have not had any issues with that as far as I am aware.

    How are customer service and support?

    I evaluate the customer service and technical support of ThreatLocker as awesome. The Cyber Hero team is great. They are very helpful and very responsive. They actually will help us get to a solution and not just repeat a script. A lot of companies repeat a script, but the people I have talked to at ThreatLocker seem genuinely interested to help, so they are great.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We were building up from the ground up and were not using another solution before choosing ThreatLocker Zero Trust Endpoint Protection Platform.

    What other advice do I have?

    I would probably say ThreatLocker Zero Trust Endpoint Protection Platform is a 10 overall. I do not have a great experience with a ton of different security vendor companies, but they have been pretty great so far. I would recommend them to any company that has to keep track of who is installing what, what is being run in the environment, controlling local admin, storage control, and all that. If you need that, then ThreatLocker Zero Trust Endpoint Protection Platform would be helpful for sure.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Mar 5, 2026
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Download our free ThreatLocker Zero Trust Platform Report and get advice and tips from experienced pros sharing their opinions.
    Updated: April 2026
    Buyer's Guide
    Download our free ThreatLocker Zero Trust Platform Report and get advice and tips from experienced pros sharing their opinions.