Try our new research platform with insights from 80,000+ expert users
Jacob Turner - PeerSpot reviewer
Network Engineer at OneconnectionIT
Real User
Top 10
Oct 7, 2025
Has unified multiple security tools and provided confidence with strong endpoint control
Pros and Cons
  • "The single pane of glass management for all this functionality is really the best feature, as it unifies many utilities that would have been separate costs before and lets us sleep at night knowing that things are being monitored 24 hours."
  • "It's very annoying to uninstall. You have to go into the online control panel and disable tampering for a device before it'll let you uninstall it without complaining really loudly."

What is our primary use case?

We're a managed service provider, mostly dealing with small business office environments, so ThreatLocker Zero Trust Endpoint Protection Platform is used in the context of many different tools. It's a unification of several different tools. Their front and center is their Application Control, where I believe the older, less correct name for it would be application whitelisting. Basically, it ensures that nothing can run within a given environment. As long as the machine is protected by ThreatLocker Zero Trust Endpoint Protection Platform, nothing can run within an environment that is not considered kosher by the admin.

If you don't allow it, it doesn't run with ThreatLocker Zero Trust Endpoint Protection Platform. It's as simple as that. I've had it block PowerShell scripts that my RMM has sent through. It's one of those things that in the moment, it's really annoying. However, the implication is that if that were anybody else, they wouldn't have been able to allow it.

What is most valuable?

I deal with ThreatLocker Zero Trust Endpoint Protection Platform. It provides peace of mind because it unifies a lot of different tools, including managed detection and response and Endpoint Detection and Response.

The single pane of glass management for all this functionality is really the best feature. It unifies many utilities that would have been separate costs before, and it lets us sleep at night knowing that things are being monitored 24 hours.

The ThreatLocker Zero Trust Endpoint Protection Platform auditing capabilities have provided valuable insights for us and have stopped several would-be malware infections.

What needs improvement?

Going with the theme of ThreatLocker Zero Trust Endpoint Protection Platform being a one-stop shop where they have just about everything, and they have a really good product stack as is. However, the one last thing I would want to see is mail security implemented similar to how Mail Protector does theirs, except obviously managed and included in a subscription tier with ThreatLocker Zero Trust Endpoint Protection Platform.

It's pretty easy to deploy as far as this functionality goes. However, it's very annoying to uninstall. You have to go into the online control panel and disable tampering for a device before it'll let you uninstall it without complaining really loudly. This is actually one of those things that is annoying in day-to-day operation because it assumes you don't know what you're doing. However, I would rather it let me know when it doesn't need to than have a situation where our protection is just being disabled and nothing's being done about it.

On a scale of 1 to 10, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a nine. There's a little bit of smoothing they could do, but most of my annoyances with it are with the concept as a whole and there's not really anything anyone can do to fix them. It comes with the territory. It's not really something that they in particular could improve upon.

For how long have I used the solution?

I have dealt with ThreatLocker Zero Trust Endpoint Protection Platform for a couple of years at this point.

Buyer's Guide
ThreatLocker Zero Trust Platform
February 2026
Learn what your peers think about ThreatLocker Zero Trust Platform. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,266 professionals have used our research since 2012.

How are customer service and support?

The support with ThreatLocker Zero Trust Endpoint Protection Platform is phenomenal. Utterly phenomenal. I literally don't think I have ever waited more than a minute to hear back.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We've been Blackpoint customers for MDR, EDR before ThreatLocker Zero Trust Endpoint Protection Platform. They did not offer the Application Control or the network control, the storage control. ThreatLocker Zero Trust Endpoint Protection Platform added the MDR, EDR functionality as a logical extension of what they do with the application whitelisting, with the network control, with the storage control. It was just a logical extension. But Blackpoint only ever offered the MDR, EDR functionality. And as far as I know, they were only just starting to branch out into Application Control before we moved over to ThreatLocker Zero Trust Endpoint Protection Platform.

What other advice do I have?

The zero-trust approach of ThreatLocker Zero Trust Endpoint Protection Platform has helped us pass certain certifications for cybersecurity. The zero-trust portion means that it's a little more annoying than traditional security software. However, you know for a fact that it's working because you can watch it stop stuff in real-time.

I do use the Application Control feature of ThreatLocker Zero Trust Endpoint Protection Platform. It is about as straightforward as you could hope for a tool. They offer many deployment options. They have an agent installer you can download. They have a deployment script that you can push through your RMM, or through a Group Policy type implementation.

I'm not very familiar with the pricing of ThreatLocker Zero Trust Endpoint Protection Platform. I don't look at the numbers typically as I focus on technological aspects and implementation. From what I understand, our licensing costs are actually fairly reasonable. For the tier we're at now, it's approximately $10 an endpoint, and we're easily able to upsell that. We're covering our costs and then a little bit on top. It's such a useful tool that if I were making the decision, I would probably even sell it at a loss and take a little bit of a chunk out of other managed service profit margins if necessary. ThreatLocker Zero Trust Endpoint Protection Platform is just that useful.

The way Ringfencing helps limit application actions is by allowing an application to run. However, that application is not allowed to talk to certain common threat vectors such as scripting hosts, PowerShell, macros, etc. That's how it's configured by default. You can configure it however you want. For example, I could stop Chrome from talking to Word if needed.

I rate ThreatLocker Zero Trust Endpoint Protection Platform a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 7, 2025
Flag as inappropriate
PeerSpot user
Security team architect at TOTVS
Real User
Top 20
Mar 2, 2025
Security control and audit features have increased our protection and customer confidence
Pros and Cons
  • "The control list is the best feature. For our company, it provides value to our customers since they can see we are improving our security."
  • "We are seeing a return on investment, especially with our managers and customers."
  • "There could be options for handling a bulk amount of machines simultaneously."
  • "I have encountered some problems with stability, however, they are resolved quickly."

What is our primary use case?

We're currently deploying 15,000 machines. For us, it is quite easy, however, the problem is that our environment is complicated to deploy due to many customizations. That said, with ThreatLocker, it is not a problem. 

How has it helped my organization?

It's getting better in terms of cost and transparency. We can see security improving and can show our evolution. 

What is most valuable?

The control list is the best feature. For our company, it provides value to our customers since they can see we are improving our security. It also helps us understand what is happening in the machines with notify audits. The solution shows evolution and helps us troubleshoot, even when installed on only some machines.

We can reduce attack surface. We have over 1500 sysadmins, and without it, it was hard to control permissions.

We hope in the future it will help us reduce costs.

We can block access to unauthorized applications. With all of the sysadmins, it had been quite difficult to block everything manually. We have more control over our environment now.

It helps us to see what's happening in the environment and can help us troubleshoot. Once we install across all machines, we can see better what's happening. 

What needs improvement?

There could be options for handling a bulk amount of machines simultaneously. Randomizing the actions instead of executing everything at once would be beneficial. This would apply to our policies, particularly for the container and Linux versions.

For how long have I used the solution?

We have been using it for about one year and six months, almost two years.

What do I think about the stability of the solution?

I have encountered some problems with stabilitiy, however, they are resolved quickly. It is not really a significant issue for me, as they are solved very fast.

What do I think about the scalability of the solution?

The scalability is okay for us. We do not have any problems.

How are customer service and support?

The customer service is very good and very fast.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Previously, we used another solution, including a solution from ManageEngine. We switched to ThreatLocker because we felt secure using it, especially with Cyber Heroes and the learning mode.

What about the implementation team?

The implementation was done in-house by me.

What was our ROI?

We are seeing a return on investment, especially with our managers and customers. We are protecting them and enhancing our security. They all feel safer with this solution.

What's my experience with pricing, setup cost, and licensing?

The setup cost is good, but money in Brazil is quite expensive. Despite the Brazilian economic issues, it is manageable when considering the dollar.

Which other solutions did I evaluate?

We just have one alternate solution in mind, which includes control mechanisms. We tested some others but liked this one a lot. We need to finish the first part.

What other advice do I have?

My overall product rating is nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
ThreatLocker Zero Trust Platform
February 2026
Learn what your peers think about ThreatLocker Zero Trust Platform. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,266 professionals have used our research since 2012.
Server Administrator at Clay County Sheriff's Office
Real User
Top 20
Mar 4, 2026
Zero trust controls have strengthened endpoint security and simplified evidence handling
Pros and Cons
  • "Overall, ThreatLocker Zero Trust Endpoint Protection Platform is an ideal solution for any company lacking comparable protection, offering complete visibility into the environment, making it a recommended choice for every organization with computer systems in place."
  • "Identifying which security and configuration settings need fixing using the DAC dashboard is somewhat difficult at times."

What is our primary use case?

As a sheriff's department, our main use cases for ThreatLocker Zero Trust Endpoint Protection Platform involve managing many different endpoints that are our deputies on the road who constantly receive evidence, encompassing various file types, including video files in executable form from banks and ATMs, necessitating careful monitoring of executions.

Additionally, we have a finance department that faces constant phishing attacks, and the platform helps us gain better control over what is executed in our environment. When something is executed, we can pause to assess its necessity.

How has it helped my organization?

By using ThreatLocker Zero Trust Endpoint Protection Platform, we have been able to consolidate several security tools, including considering removing SentinelOne to streamline everything under ThreatLocker and ThreatLocker Detect to minimize device overhead. Previously, we encountered conflicts between tools, but transitioning entirely to ThreatLocker has been satisfying as it effectively prevents threats.

What is most valuable?

For us, the features we appreciate most about ThreatLocker Zero Trust Endpoint Protection Platform are the learning mode, maintenance modes, and installation modes which we utilize heavily. We do not allow new applications to be executed in our environment, so we maintain an approved list of applications. The learning mode enables us to learn these applications initially, thus preventing the launch of anything else. If an unapproved application attempts to launch, it prompts a conversation about its necessity, often revealing that we might already have a similar tool we can use. The maintenance mode is indispensable for us.

My impression of the allow-listing feature of ThreatLocker Zero Trust Endpoint Protection Platform is positive; it is convenient that for widely used applications such as Adobe, we do not have to learn each individual application as we can simply allow the entire suite, ensuring all updates and applications are included. This feature helps us establish a static baseline of safe items to ensure familiarity within our finance department and other teams.

I have used the ringfencing feature of ThreatLocker Zero Trust Endpoint Protection Platform.

I assess the impact of ThreatLocker Zero Trust Endpoint Protection Platform on controlling the behavior of approved applications as beneficial; for example, with our CAD program, there is no need for outside applications to interface with it. This ringfencing capability allows us to monitor any unauthorized interaction attempts with our applications, providing intensive oversight of their behavior.

Regarding the network control feature of ThreatLocker Zero Trust Endpoint Protection Platform, I do not use it extensively; we mainly rely on our network firewall since all our clients are connected through a VPN. However, I am actively learning about the features and plan to advocate for increased usage as I recognize we are under-utilizing this aspect.

I do use the elevation control feature of ThreatLocker Zero Trust Endpoint Protection Platform.

My assessment of how ThreatLocker Zero Trust Endpoint Protection Platform facilitates just-in-time administrative access for approved applications is quite favorable; for instance, one of our applications requires admin access for initial launches or periodically to download new map files. This application can be set to launch as an admin automatically, alleviating recurring issues.

ThreatLocker Zero Trust Endpoint Protection Platform helps us save on operational costs and expenses, particularly concerning application management since it enables us to verify applications efficiently. Before, we often had to backtrack and resolve issues created by unverified installations, which has transitioned to a more proactive stance against vulnerabilities.

What needs improvement?

Identifying which security and configuration settings need fixing using the DAC dashboard is somewhat difficult at times. Initially, we encountered challenges when launching applications for the first time due to denials, requiring a detailed investigation. However, I have found that there is a more effective approach available in the panel for this purpose; nonetheless, I still struggle to pinpoint the exact reasons for certain denials and the policies causing them.

To improve ThreatLocker Zero Trust Endpoint Protection Platform, it would be beneficial to integrate a notification feature with the learning mode that clearly indicates items learned during a session. This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.

For how long have I used the solution?

We have been using ThreatLocker Zero Trust Endpoint Protection Platform for a little over a year now.

What do I think about the stability of the solution?

I assess the stability and reliability of ThreatLocker Zero Trust Endpoint Protection Platform as excellent; in the entire time we have had it, there was only one occasion where it crashed, necessitating a reinstall. Given the scale of our operations managing a thousand installations, this performance is impressive.

What do I think about the scalability of the solution?

ThreatLocker Zero Trust Endpoint Protection Platform scales well with our company's growing needs; as we continuously hire new deputies and add servers, the installation process is smooth and easy when the right server or workstation applications are designated for installation.

How are customer service and support?

My experience with the customer service and technical support for ThreatLocker Zero Trust Endpoint Protection Platform is positive; they are responsive and readily available. We manage through our MSP, which facilitates direct communication during troubleshooting, making it easy to connect when issues arise. I would rate the support at a ten as I have never faced any problems.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Prior to using ThreatLocker Zero Trust Endpoint Protection Platform, we were utilizing SentinelOne.

How was the initial setup?

My experience with pricing, setup cost, and licensing for ThreatLocker Zero Trust Endpoint Protection Platform is that the setup process is straightforward. While I do not know the specifics of our financial arrangement because our finance department manages that, we focus on securing multiple vendor quotes as part of our internal procedures. The initial learning phase took about a month or two, establishing a baseline across our machines, and after that, it became an effortless operation.

What about the implementation team?

We manage through our MSP, which facilitates direct communication during troubleshooting, making it easy to connect when issues arise.

What's my experience with pricing, setup cost, and licensing?

Quantifying the exact savings ThreatLocker Zero Trust Endpoint Protection Platform provides is challenging, but I estimate it saves us at least a couple of hours a week through streamlined auditing processes rather than the manual effort previously required.

Which other solutions did I evaluate?

There are no other solutions I am aware of that address similar needs outside of ThreatLocker Zero Trust Endpoint Protection Platform. I believe we considered a couple of other solutions during our decision-making process, but I cannot recall their names now.

What other advice do I have?

Overall, I would give ThreatLocker Zero Trust Endpoint Protection Platform a rating of ten out of ten. It is an ideal solution for any company lacking comparable protection, offering complete visibility into the environment, making it a recommended choice for every organization with computer systems in place. I have not used the storage control feature of ThreatLocker Zero Trust Endpoint Protection Platform until recently; I finally got it turned on today. We plan to implement it, especially since we frequently receive various USBs as evidence in law enforcement, allowing us to issue specific USBs that individuals can use safely without risking unknown data from random devices.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 4, 2026
Flag as inappropriate
PeerSpot user
CTO at Zettabytes
Real User
Top 20
Mar 2, 2025
Implementation ensures strong customer protection and quick support
Pros and Cons
  • "The deployment is very easy."
  • "A few years back, we had an attack on one of our biggest clients."
  • "Some reporting areas need improvement."
  • "Some reporting areas need improvement. We need to generate more reports."

What is our primary use case?

Many of our firms are currently using ThreatLocker, and they have been very happy with it. It can block unauthorized software from being downloaded. 

How has it helped my organization?

A few years back, we had an attack on one of our biggest clients. After that, we implemented ThreatLocker. For the last couple of years, there have been no issues or attacks. This has been really helpful.

What is most valuable?

Currently, we are not using the full range of modules, however, we are using ThreatLocker elevation. That's really good. 

The deployment is very easy.

We've been able to save some operational costs and expenses by using this product. However, the main thing is that it protects our customers. 

The zero-trust endpoint availability is good. It can block unknown applications straight away.

We have reduced help desk tickets. It helps with management. We have a good team in place. 

What needs improvement?

Some reporting areas need improvement. We need to generate more reports. That area should be improved. We'd like reporting on if someone tried to install software, we'd like to be able to generate reports on what was blocked.

For how long have I used the solution?

I have been using ThreatLocker for the past four years.

What do I think about the stability of the solution?

Stability is good; it is a growing business. Over the last four years, it has grown significantly.

What do I think about the scalability of the solution?

Scalability is good. There has been no impact in the last couple of years.

How are customer service and support?

Support is good, with very quick support from Cyber Heroes if any staff requires help. From our side, they are really helpful.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We did not use another solution previously.

How was the initial setup?

The initial setup is good; deploying is very easy.

What about the implementation team?

We are managing the implementation ourselves.

What was our ROI?

It's protecting our customers. That is the main thing. That's our ROI.

What's my experience with pricing, setup cost, and licensing?

In the last couple of years, the price has remained the same. Nothing has changed, and it's good. I hope it will not increase soon.

Which other solutions did I evaluate?

We did not evaluate other options. 

What other advice do I have?

The overall rating of the solution is eight out of ten. We need to improve the reporting side, including reporting and generating reports. That area needs to be improved.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
IT Coordinator at Tech Rockstars
Real User
Top 20
Mar 4, 2026
Zero trust controls have simplified antivirus management and protect outdated dental systems
Pros and Cons
  • "Zero-Touch is the future, and ThreatLocker Zero Trust Endpoint Protection Platform is the easiest way to accomplish that."
  • "I actually have a gripe with the allowlisting feature of ThreatLocker Zero Trust Endpoint Protection Platform."

What is our primary use case?

We're using ThreatLocker Zero Trust Endpoint Protection Platform primarily as our antivirus to restrict access. We provide our employees with the programs they need to use, and then we ensure that anything not running is not allowed to run.

Many dental places use scanners that are two or three generations too old with software that only runs on Windows 7, so Ringfencing from ThreatLocker Zero Trust Endpoint Protection Platform is perfect for that. It allows us to have a computer on the network that has many potential vulnerabilities, but we are able to prevent any unauthorized activity.

By using ThreatLocker Zero Trust Endpoint Protection Platform, we're using it as our primary antivirus, so we're not using things such as Bitdefender or anything else that we might suggest. We are just using ThreatLocker as our primary for that.

What is most valuable?

Personally, I really think the Ringfencing feature of ThreatLocker Zero Trust Endpoint Protection Platform is really cool. I think allowing yourself to run more antiquated, obsolete things through Ringfencing is really powerful, especially with companies who want to be cost-effective.

Ringfencing allows us to do exactly what we need and nothing more. That is exactly what we want with these more obsolete devices that we are Ringfencing.

The Elevation Control feature of ThreatLocker Zero Trust Endpoint Protection Platform is one that we use quite often, and I think it's also something that really speeds up a lot of our day-to-day work by being able to quickly say we will elevate this and then we will go on about our day.

I would say the Elevation Control feature really improved our process because it prevents our users from needing to call us or write us and wait on hold for ten or so minutes to request elevation. They will send in the request, we will get an email or it will pop up on the elevation dashboard, and it is as easy as clicking and going.

What needs improvement?

I actually have a gripe with the allowlisting feature of ThreatLocker Zero Trust Endpoint Protection Platform. When updating software, it is a little inconvenient. Many users actually tend to have an issue, and I have spoken with other people here at the ThreatLocker event as well, where that is the main issue coming from the user end in that they want to install something and install it immediately without having to ask anybody. However, I feel that might be a necessary evil in order to have everything secure, as we do not want them accidentally running ransomware or something similar.

Primarily, we have different VPN services, but we are trying to slowly integrate some of the VPN features of ThreatLocker Zero Trust Endpoint Protection Platform. We are having a little trouble with that integration, specifically with the Network Control.

For how long have I used the solution?

We had ThreatLocker Zero Trust Endpoint Protection Platform in place at our company as soon as I started working here, approximately a year ago.

How are customer service and support?

I use the help center on ThreatLocker portal quite often, and they are usually very responsive, which I think is really impressive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We do not need those tools anymore as we use ThreatLocker Zero Trust Endpoint Protection Platform as a replacement.

What other advice do I have?

Personally, I think ThreatLocker Zero Trust Endpoint Protection Platform is fine the way it is. I have no big complaints with it. I would say maybe the education on it could be a little clearer. I know they have a bootcamp and an exam for that, and you can also take that online. They also have the help center available. ThreatLocker is pretty squared away in my opinion.

We are running a pretty lean setup, so ThreatLocker Zero Trust Endpoint Protection Platform allows us to have an overview of all the computers that we are managing at one time, which is very helpful in that way.

We are a small company of less than fifteen people managing around seventy different clients, all with a varying amount of computers from five computers to almost twenty. I would say that ThreatLocker Zero Trust Endpoint Protection Platform has not impeded any of that. It is definitely usually the smoothest part of the process to get ThreatLocker enabled.

There is a lot of overhead when you are running a bunch of antiviruses with personal users having their own things they want to run, but if we have ThreatLocker, we can tell them that we know everything that is going on. We do not really need to have any of this that is causing additional overhead on your computer.

Zero-Touch is the future, and ThreatLocker Zero Trust Endpoint Protection Platform is the easiest way to accomplish that. If you already have Zero-Touch in place, then that is fine, but if you want it to be easy and scalable, ThreatLocker is the way to do it. I would give ThreatLocker Zero Trust Endpoint Protection Platform a rating of ten out of ten, as this is probably the easiest way to implement IT for any company and any IT security is through ThreatLocker.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 4, 2026
Flag as inappropriate
PeerSpot user
IT Admin at a non-tech company with 11-50 employees
Real User
Top 20
Mar 5, 2026
Zero trust controls have simplified admin removal and now streamline secure software installs
Pros and Cons
  • "We have gotten a lot of use out of the feature of removing local admins from a lot of computers with ThreatLocker Zero Trust Endpoint Protection Platform."
  • "At the time, ThreatLocker does not have a great way to do that; you have to make separate groups."

What is our primary use case?

We use Application Control with ThreatLocker Zero Trust Endpoint Protection Platform, and we have started to use Network Control a little bit. Elevation Control is the main feature we have gotten use out of.

One of the things we have discussed with our solutions engineer at ThreatLocker is that we are trying to do nested groups. At the time, ThreatLocker does not have a great way to do that; you have to make separate groups. They said that is already in the works, so I do not know if that is helpful, but that is the main thing.

How has it helped my organization?

We have gotten a lot of use out of the feature of removing local admins from a lot of computers with ThreatLocker Zero Trust Endpoint Protection Platform. Our company is spread out, so we cannot usually get hands-on those computers. It is a lot easier to hit the button on ThreatLocker Zero Trust Endpoint Protection Platform and remove it and also just get an audit of whether there are any other local admins floating out there. That has been really helpful. The testing environment has been very helpful as well.

We did not have any testing environment previously to using ThreatLocker Zero Trust Endpoint Protection Platform, so it was us as IT admins doing our best to test software before deploying it out to the users. That helps a lot.

I assess its role in facilitating just-in-time administrative access for approved applications with ThreatLocker Zero Trust Endpoint Protection Platform as very helpful in allowing a user to install software, so we do not have to actually remote in and put our credentials. We can give them an hour to install the software, monitor their machine, make sure it is all safe, and they are good to go after that. It helps us save a lot of time.

I find the Storage Control feature in ThreatLocker Zero Trust Endpoint Protection Platform to be very helpful when it comes to enforcing policy-driven access over various storage devices. We are trying to get into CMMC, which is a compliance certification; one of the requirements is to inventory any USB devices that we have floating around the company. With ThreatLocker Zero Trust Endpoint Protection Platform, we are able to name those devices, record their serial number and everything, and who they are assigned to. We have visibility into that, and it is very helpful.

What is most valuable?

The allow-listing feature in ThreatLocker Zero Trust Endpoint Protection Platform is very helpful for managing which software, scripts, and libraries run on my device. It is obviously a lot better than trying to blocklist specific things. We can only allow the things that we want in the environment.

I have used the Ringfencing feature in ThreatLocker Zero Trust Endpoint Protection Platform.

I assess its impact on controlling the behavior of approved applications with ThreatLocker Zero Trust Endpoint Protection Platform as working well to me. I am not super deep into it as far as how we are designing the Ringfencing, what we are blocking, and what we are allowing, but from what I can tell, it is helpful.

We have gotten a lot of use out of Elevation Control feature in ThreatLocker Zero Trust Endpoint Protection Platform.

What needs improvement?

I do not believe we have started eliminating anything with ThreatLocker Zero Trust Endpoint Protection Platform; it is just an add-on for us right now.

We have not gotten too deep into blocking things on the network with ThreatLocker Zero Trust Endpoint Protection Platform. We do have RDP blocked on user endpoints now, so that is helpful for sure.

I have not yet used the DAC dashboard.

I do not know if we are actually using the real-time threat intelligence category controls employed by web control in blocking malicious and non-compliant sites.

For how long have I used the solution?

We got ThreatLocker Zero Trust Endpoint Protection Platform about a year ago.

What do I think about the stability of the solution?

ThreatLocker Zero Trust Endpoint Protection Platform has been pretty solid in terms of stability and reliability. There is one slight issue we have run into where the testing environment sometimes is not available, but they do provide updates and emails. Nothing is going to have perfect 99.999% uptime, so that is understandable. But that is really the only hiccup we have had.

What do I think about the scalability of the solution?

As far as I know, ThreatLocker Zero Trust Endpoint Protection Platform has scaled pretty smoothly with the growing needs of my company; we have not had any issues with that as far as I am aware.

How are customer service and support?

I evaluate the customer service and technical support of ThreatLocker as awesome. The Cyber Hero team is great. They are very helpful and very responsive. They actually will help us get to a solution and not just repeat a script. A lot of companies repeat a script, but the people I have talked to at ThreatLocker seem genuinely interested to help, so they are great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were building up from the ground up and were not using another solution before choosing ThreatLocker Zero Trust Endpoint Protection Platform.

What other advice do I have?

I would probably say ThreatLocker Zero Trust Endpoint Protection Platform is a 10 overall. I do not have a great experience with a ton of different security vendor companies, but they have been pretty great so far. I would recommend them to any company that has to keep track of who is installing what, what is being run in the environment, controlling local admin, storage control, and all that. If you need that, then ThreatLocker Zero Trust Endpoint Protection Platform would be helpful for sure.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 5, 2026
Flag as inappropriate
PeerSpot user
CEO at Mostro
Real User
Top 20
Mar 4, 2026
Ring fencing and allow listing have controlled shadow it and protect downloads effectively
Pros and Cons
  • "ThreatLocker Zero Trust Endpoint Protection Platform has helped my company and my clients' companies save on operational costs and expenses, and I would estimate we have saved at least thirty to forty percent."
  • "I believe ThreatLocker Zero Trust Endpoint Protection Platform could be improved with a mobile version, as many clients work off their phones, downloading all kinds of things on their mobile devices."

What is our primary use case?

My main use cases for ThreatLocker Zero Trust Endpoint Protection Platform are to manage shadow IT and to prevent the issue of not being able to restrict downloads.

What is most valuable?

The feature I prefer most about ThreatLocker Zero Trust Endpoint Protection Platform is the Ring Fencing.

Ring Fencing is important because most of the clients I deal with don't have any control over what their employees are doing, and they're downloading and exposing themselves. Shadow IT exists extensively, and this feature helps prevent that.

I have found the allow listing feature of ThreatLocker Zero Trust Endpoint Protection Platform to be quite good. I appreciate that it takes the time to learn the client prior to putting it into secure mode, which helps eliminate the back and forth at the beginning of the relationship with the client.

I have used the Ring Fencing feature, and thankfully, I haven't had any issues with it. It has been straightforward and works well.

I find the health score to be one of the new features I was examining, and I appreciate that it can show people the different scores that they have as a company once everything is installed. This allows them to see many things they didn't even know they had on their computers.

Using the DAC dashboard to identify which security and configuration settings need fixing has been excellent and very insightful.

What needs improvement?

I believe ThreatLocker Zero Trust Endpoint Protection Platform could be improved with a mobile version, as many clients work off their phones, downloading all kinds of things on their mobile devices. We currently can only protect the workstation versus the actual mobile device.

For how long have I used the solution?

I have been using ThreatLocker Zero Trust Endpoint Protection Platform for about a year and a half.

What do I think about the stability of the solution?

I haven't experienced any downtime, crashes, or performance issues with ThreatLocker Zero Trust Endpoint Protection Platform. Everything has been excellent.

What do I think about the scalability of the solution?

ThreatLocker Zero Trust Endpoint Protection Platform scales very smoothly with our growing needs, and my account representative has been very helpful with no complaints at all.

How are customer service and support?

I evaluate the customer service and technical support as great. We have cadence calls, and anytime I have any questions, they help me out very quickly. I would rate the customer service a ten out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I was not using or working with another product before using ThreatLocker Zero Trust Endpoint Protection Platform. Nothing did what ThreatLocker does.

What was our ROI?

ThreatLocker Zero Trust Endpoint Protection Platform has helped my company and my clients' companies save on operational costs and expenses. I would estimate we have saved at least thirty to forty percent.

What's my experience with pricing, setup cost, and licensing?

The pricing, setup costs, and licensing of the solution seem quite good. The pricing is not prohibitive, and for the value we're getting, I think it's good.

What other advice do I have?

By using ThreatLocker Zero Trust Endpoint Protection Platform, I haven't consolidated any other tools.

The efficiency of the real-time threat intelligence and category controls employed by Web Control in blocking malicious and non-compliant sites is excellent and fast. The cyber heroes are very quick to answer when I need any help.

My experience with ThreatLocker Zero Trust Endpoint Protection Platform has been very positive overall. I would give this solution a rating of ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partnership
Last updated: Mar 4, 2026
Flag as inappropriate
PeerSpot user
Kyle Lindley - PeerSpot reviewer
Assistant IT General Manager at a financial services firm with 11-50 employees
Real User
Top 20
Mar 5, 2026
Application control has reduced shadow IT and now improves visibility into employee software use
Pros and Cons
  • "Essentially, ThreatLocker Zero Trust Endpoint Protection Platform is super easy to use, very informative, and it does everything quickly and easily."

    What is our primary use case?

    Currently, we are utilizing application control with ThreatLocker Zero Trust Endpoint Protection Platform to control what our employees are able to access, but we do plan on moving further into the storage control piece.

    We are already seeing some curtailing of shadow IT applications and optimizing the approval process for new applications with ThreatLocker Zero Trust Endpoint Protection Platform.

    The biggest thing that we have seen with ThreatLocker Zero Trust Endpoint Protection Platform is the ability to identify applications that employees have not brought before IT or information security to ensure it is an approved application.

    We have not really utilized the network control aspect of ThreatLocker Zero Trust Endpoint Protection Platform at this time.

    We do not really utilize the real-time threat intelligence and category controls employed by web control in ThreatLocker Zero Trust Endpoint Protection Platform at this time.

    What is most valuable?

    ThreatLocker Zero Trust Endpoint Protection Platform allows a lot more control to prevent malware attacks that are trying to identify themselves as different things utilizing the ring fencing capabilities, as well as catching any non-IT approved applications that come through.

    The greatest feature that I appreciate about ThreatLocker Zero Trust Endpoint Protection Platform is the unified audit; there is just one screen that I go to where I am able to see everything I need, apply the filters that I require, and see it all.

    ThreatLocker Zero Trust Endpoint Protection Platform allows me to go in and see what has been blocked recently, make sure that there is not anything malicious in the field, or that nothing is impacting the day-to-day needs of our employees.

    We have used the ring fencing feature with ThreatLocker Zero Trust Endpoint Protection Platform; it has been very handy in basically locking down the access range that our authorized applications have and keeping things where they need to be.

    It is very easy to manage the allow-listing feature of ThreatLocker Zero Trust Endpoint Protection Platform; it makes it much easier to look at everything and confirm that I know what that program is and what that application is so I can let it run, versus having to go through a giant list and try to remember what something is called based on file names. This is definitely very user-friendly.

    What needs improvement?

    At this point, I have not found anything about ThreatLocker Zero Trust Endpoint Protection Platform that really needs improvement.

    Maybe the documentation for ThreatLocker Zero Trust Endpoint Protection Platform could be enhanced, but it would be a minor improvement.

    For how long have I used the solution?

    We have been using ThreatLocker Zero Trust Endpoint Protection Platform for about three months.

    What do I think about the stability of the solution?

    ThreatLocker Zero Trust Endpoint Protection Platform is stable; we have had zero issues in terms of getting into it, operating it, or making or saving any changes that we have ever needed to make. It is also very quick.

    What do I think about the scalability of the solution?

    So far, we have had no issues with the scalability of ThreatLocker Zero Trust Endpoint Protection Platform; it has been able to expand and the group and customization we get out of it is quite impressive.

    How are customer service and support?

    We have not really needed to utilize customer support at this time for ThreatLocker Zero Trust Endpoint Protection Platform; the implementation team and support from that avenue has been more than sufficient for us to keep things up and running and functional.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    We did not previously use a different solution with ThreatLocker Zero Trust Endpoint Protection Platform. We did not really evaluate any other options before choosing ThreatLocker Zero Trust Endpoint Protection Platform; we were able to witness a demo and see it in action at a conference at one point and it really intrigued us. We arranged for more of a live demo on our side along with some implementation and review, and it just fit all the needs that we had.

    How was the initial setup?

    Keep the cadence of the implementation meetings when looking into using ThreatLocker Zero Trust Endpoint Protection Platform; they are your greatest resource in getting things onboarded and everything set up. That is really the key piece. Without our implementation team, it would not be going nearly as smoothly as it does. Give yourself time as well. It is not something that can happen quickly, especially if you have a complex array of systems that touch a lot of different things. Make sure that you do not go too secure too quickly.

    What about the implementation team?

    With the capabilities and the power that were behind ThreatLocker Zero Trust Endpoint Protection Platform, it came in at a much lower number than what we expected, and the team that helped us get it all lined out was quick, efficient, and very informative.

    What was our ROI?

    We are not expecting immediate returns at this time, but we are expecting to see some good returns in terms of risk being brought down due to the fact that malicious software will not be able to be run and shadow IT applications will not be done as well.

    What other advice do I have?

    At this time, we have not consolidated anything with ThreatLocker Zero Trust Endpoint Protection Platform, but the plan is to consolidate our USB tool management to prevent unauthorized USB devices on the network.

    We have not run into too many situations that required workarounds; we have mostly been reviewing the blocked items and selecting the ones that we need to get enabled. This is because we are still in the early implementation phase.

    I would rate ThreatLocker Zero Trust Endpoint Protection Platform a 10 overall.

    Essentially, ThreatLocker Zero Trust Endpoint Protection Platform is super easy to use, very informative, and it does everything quickly and easily.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Mar 5, 2026
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Download our free ThreatLocker Zero Trust Platform Report and get advice and tips from experienced pros sharing their opinions.
    Updated: February 2026
    Buyer's Guide
    Download our free ThreatLocker Zero Trust Platform Report and get advice and tips from experienced pros sharing their opinions.