What is our primary use case?
As the administrator for ThreatLocker Zero Trust Endpoint Protection Platform, I manage it, deploy it for new clients, and if someone installs an application that ThreatLocker stops, I have to allow that. So we can say I am the admin of ThreatLocker in my day-to-day life.
Once, one of our big clients in the US installed a new application, but it was stopped by ThreatLocker. They emailed me that their application was not working, and then I reviewed it. I took approval from their senior managers before allowing that application in their environment, and afterward, I approved it.
I just do daily tasks where I create policies for the applications they use. There are some generic applications which they use, so I create policies for them to ensure new users will not encounter issues. Sometimes, I have to approve applications, but I need to get approval from their manager or some senior engineer before real-time approval.
Ring-Fencing technology helps me day-to-day by monitoring application behavior. If it thinks the application is malicious or has code that shouldn't run in the environment, it stops that. For example, if an SQL application throws some codes, and if the application stops working, we need to check why it stopped, and then we can approve it if it's justified.
What is most valuable?
The best features of ThreatLocker Zero Trust Endpoint Protection Platform include a deny-by-default approach, ensuring only approved applications and processes can run, which significantly reduces attack surfaces. It provides granular application control that prevents ransomware, unauthorized scripts, and unknown executables from executing. It stops ransomware before executing, which greatly improves endpoint security, along with its unique Ring-Fencing technology that restricts application behavior and prevents trusted applications from being exploited maliciously. Additionally, it provides precise control over USB devices, external storage, and network shares to help prevent data exfiltration.
The easy policy management with a centralized dashboard makes it effortless for IT teams and engineers to manage policies, approval workflows, and endpoint visibility. The real-time approval system allows administrators to approve or deny applications instantly without disrupting endpoint user productivity. Strong visibility of audit logs offers detailed logs and reporting that help with compliance, forensic analysis, and security investigations. The lightweight endpoint performance impact means it operates effectively without noticeable system downtime compared to traditional antivirus solutions, making it a highly scalable platform ideal for MSPs and organizations managing multiple clients or distributed environments.
Overall, ThreatLocker Zero Trust Endpoint Protection Platform has significantly strengthened our endpoint security by enforcing zero trust principles while maintaining operational flexibility and user productivity.
ThreatLocker Zero Trust Endpoint Protection Platform has positively impacted my organization by preventing unknown applications from running in my environment. Many clients cannot run applications without our permissions, and I also have great control over the endpoints, enhancing both productivity and security.
After implementing ThreatLocker Zero Trust Endpoint Protection Platform, we have seen a productive impact, including significantly reduced security incidents. The deny-by-default approach drastically minimizes malware and unauthorized application incidents, which reduces emergency remediation efforts and results in less endpoint downtime. Systems experience fewer disruptions caused by ransomware, malicious scripts, or unwanted software installations, leading to improved uptime for the end user.
Faster troubleshooting and detailed logging allow us to quickly identify blocked processes or unauthorized behavior, significantly reducing troubleshooting time. The real-time approval feature enables our IT team to instantly approve legitimate applications, avoiding long user wait times while maintaining security. Our IT team spends less time handling infections or cleanup tasks and more time on proactive infrastructure improvements. Once policies are properly tuned, users can work without interruption while security remains tight, enforced in the background.
Overall, ThreatLocker Zero Trust Endpoint Protection Platform has shifted our environment from reactive incident handling to proactive security management, leading to a measurable reduction in downtime and support overload.
What needs improvement?
ThreatLocker Zero Trust Endpoint Protection Platform is already an optimized platform. I have a great experience with this, so I don't think anything needs to be improved.
There might be a small thing, but I would need to assess that further.
I took off one point because sometimes it can be a bit complicated for new engineers, such as my teammates, especially for those who don't have hands-on experience. They occasionally find it difficult to check application approvals. Overall, for me, it's good.
For how long have I used the solution?
I have been using ThreatLocker Zero Trust Endpoint Protection Platform for about three years and I am continuously using it.
What do I think about the stability of the solution?
In my experience, ThreatLocker Zero Trust Endpoint Protection Platform is stable because we have not encountered any major crashes or reliability issues. The agent runs consistently in the background without causing system instability or performance degradation. Any operational challenges we experienced were mostly related to initial policy tuning or application allowing, which is expected when implementing a zero-trust model. Once policies were properly configured, the environment became very stable. Overall, I have not observed any unexpected agent crashes, minimal impact on endpoint performance, and consistent policy enforcement across devices. ThreatLocker Zero Trust Endpoint Protection Platform has proven to be a dependable and stable security solution for both daily operations and long-term endpoint protection.
What do I think about the scalability of the solution?
Regarding scalability, we have added new endpoints easily, as the policies were already made, and we just copied them to the new organization. So it's not a big deal.
How are customer service and support?
The customer support of ThreatLocker Zero Trust Endpoint Protection Platform is really quick, and they respond very promptly. I've had a good experience with them.
Which solution did I use previously and why did I switch?
We have eliminated CrowdStrike because we were using it for security purposes before we started using ThreatLocker Zero Trust Endpoint Protection Platform, which has proven to work for us.
We used CrowdStrike before ThreatLocker Zero Trust Endpoint Protection Platform and switched because CrowdStrike was complicated. There was also a significant security concern last year that led us to make the switch.
How was the initial setup?
My advice for organizations looking into using ThreatLocker Zero Trust Endpoint Protection Platform would be to plan the initial deployment and policy configuration carefully, especially during the early learning phase of adopting a zero-trust model. Since ThreatLocker Zero Trust Endpoint Protection Platform works on a deny-by-default approach, which is extremely powerful for security, organizations should start with learning mode and a staged deployment to understand application behavior.
It's essential to ensure the IT team receives proper training, as policy management and application approvals may feel complex for engineers new to zero trust. Define approval workflows in advance to avoid user disruption by gradually enforcing policies instead of applying strict controls immediately. Once properly configured, ThreatLocker Zero Trust Endpoint Protection Platform becomes a highly effective and low-maintenance security solution that significantly strengthens endpoint protection while maintaining productivity.
What was our ROI?
I haven't observed specific metrics regarding return on investment, but I am aware of the general impacts.
I haven't noticed any specific benefits in terms of saving time, reducing the need for extra staff, or seeing fewer security incidents since using ThreatLocker Zero Trust Endpoint Protection Platform, so I can't provide numbers.
Which other solutions did I evaluate?
Before choosing ThreatLocker Zero Trust Endpoint Protection Platform, we did not evaluate any other options.
What other advice do I have?
The allowlisting feature in ThreatLocker Zero Trust Endpoint Protection Platform effectively manages which software, scripts, and libraries run on our devices, as it provides excellent control while enforcing security measures.
I find the allowlisting feature easy to use, and it gives me enough control over which software, scripts, and libraries can run.
I can say it is easy to identify which security and configuration settings need fixing using the DAC dashboard; I would rate it a 10 out of 10 for me.
The efficiency of the real-time threat intelligence and category controls employed by web control is a big plus, as it helps ensure that we are dynamically protected even as new threats emerge.
I would rate this review nine out of ten overall.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.