I work for an architecture firm. We use ThreatLocker Protect to protect the company's systems from unknown malware by blocking unapproved applications. We encounter a lot of malware and ThreatLocker has been able to help with that.
Senior System Administrator at Molders Group Limited
Highly effective at controlling applications and securing our systems
Pros and Cons
- "The application whitelisting feature allows us to block and manage approved applications effectively. It ensures that no one can install an application on our systems unless it is approved by me, which is very efficient."
- "ThreatLocker Protect has improved my organization greatly."
- "The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
- "The support could be quicker."
What is our primary use case?
How has it helped my organization?
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable
ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it.
Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure.
ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth.
We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware.
ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations.
ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.
What is most valuable?
The application whitelisting feature allows us to block and manage approved applications effectively. It ensures that no one can install an application on our systems unless it is approved by me, which is very efficient.
It is very easy to use. When a user sends a request, you can go to the dashboard to view the application that the user wants you to approve. If you are okay with the application, you just click the Approve button to approve. It is very easy.
What needs improvement?
The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed.
The stability can also be better.
Buyer's Guide
ThreatLocker Zero Trust Platform
April 2026
Learn what your peers think about ThreatLocker Zero Trust Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
892,487 professionals have used our research since 2012.
For how long have I used the solution?
I have been using ThreatLocker Protect for the past three years.
What do I think about the stability of the solution?
Stability can be improved as there are times it goes down or requires management to adjust policies. I would rate stability a six out of ten.
What do I think about the scalability of the solution?
It is scalable to an extent, depending on where it is used. I would rate scalability a seven out of ten.
We have one location but multiple departments. Overall, we have 25 users.
Our company is small. I know which applications each user is supposed to use and what they need. Once I get a request, I go over to the application they need to install. If it aligns with the work they do, I approve it.
How are customer service and support?
I would rate their support a five out of ten. It could be better, especially with response times.
Which solution did I use previously and why did I switch?
We did not use another solution before.
How was the initial setup?
The initial setup was straightforward. Its deployment took about a week.
What was our ROI?
Our return on investment with ThreatLocker is about 20%.
Its time to value was immediate.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable and normal. I do not have any problems with the cost.
What other advice do I have?
I would recommend ThreatLocker Protect to other users as it is a very important tool for IT administrators like me. It helps manage user access and secures the system efficiently.
I would rate ThreatLocker Protect an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Cybersecurity Technology Specialist at Freez.it
Efficient security management has reduced costs and eliminated ransomware threats
Pros and Cons
- "Ringfencing is a valuable feature."
- "With ThreatLocker, we don't have shadow IT, and it has reduced ransomware."
- "It would be beneficial if it became more recognized in the EU to gain respect."
What is our primary use case?
I primarily use it on servers. We deal with smaller customers, and they don't always have the money to get it on every endpoint. The main thing exposed to the internet is, of course, the server, RDP, and other functions.
We have some customers that have it on the endpoint. In the past few years of using ThreatLocker, I haven't experienced ransomware on servers. However, there are small occurrences on endpoints when they're not using ThreatLocker.
How has it helped my organization?
With ThreatLocker, we don't have shadow IT, and it has reduced ransomware.
We have a lot of companies concerned with compliance. They have an application list, and anything outside of that application list is not allowed. ThreatLocker makes that really easy for us since you just allow what they need, and no one can run anything else.
What is most valuable?
Ringfencing is a valuable feature. If someone gains access to something or some end user attempts to run malicious PowerShell commands to download malware, it simply doesn't allow it. It's like saying, I'm not permitted to reach out to this.
ThreatLocker eliminates shadow IT and reduces ransomware. We have many companies that need compliance. They have an application list, and anything outside of that list is not allowed. ThreatLocker makes this easy by allowing only what we need, preventing us from running anything else.
Previously, I used AppLocker, a Windows tool, which is a lot of work to manage. ThreatLocker reduced work, allowing us to hire fewer people for this job. The time saved from not having to do recovery when malware runs, which can't happen with ThreatLocker, also saves money.
It's fairly easy to use. It has a learning curve. However, if you go to the university, you should be fine. And if you don't know something, you can just click the chat button. You'll be chatting with someone in 30 seconds.
It reduces work. It helps us save on operational costs that way. You can hire fewer people or move people onto other stuff. People can be moved to other tasks. We likely save one FTE a year, so it saves us around 30,000 euros.
We can block access very well. They are doing their job.
It reduces the amount of time a ticket takes to action.
What needs improvement?
It doesn't really have to do with ThreatLocker as a company. It's really annoying when other companies don't sign their executables with a certificate, requiring new rules for new files. It would be beneficial if it became more recognized in the EU to gain respect. That's about the only issue I can think of.
For how long have I used the solution?
I have used the solution for a little bit more than three years now.
What do I think about the stability of the solution?
It's really stable. Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter. It still works.
What do I think about the scalability of the solution?
The scalability is great. I can put as many endpoints in it as I like.
How are customer service and support?
The customer service is very good. If I need someone, I hit the chat button, and 30 seconds later, there is someone there to help me.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I used the Windows built-in AppLocker, and that was it.
How was the initial setup?
We use RMM to deploy the agent.
The initial setup had its ups and downs. That was all on us. We tried to roll it out for everyone at the same time. I'd advise against that.
What about the implementation team?
I had a Solutions Engineer help me. He was from ThreatLocker.
What was our ROI?
I would estimate savings equivalent to one person per year, which is about 30,000 euros in our country. Not dealing with recovery when malware runs, as it can't run, saves a lot of time and money. The subscription includes help desk time, saving us even more.
What's my experience with pricing, setup cost, and licensing?
The setup is quite cheap, considering what it does.
Which other solutions did I evaluate?
I didn't evaluate a different solution before choosing this one. Afterwards, I looked at Cyberfox for the elevation control, however, it was unsatisfactory.
What other advice do I have?
I rate the solution a ten out of ten.
If something isn't working, you get a helpdesk ticket. If they don't know the answer, they escalate and eventually hop on a call with you without automatically closing tickets. It's been great. My Solutions Engineer has been fantastic. Even as he's moved up within the company, I can still call him.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
ThreatLocker Zero Trust Platform
April 2026
Learn what your peers think about ThreatLocker Zero Trust Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
892,487 professionals have used our research since 2012.
CTO at Zettabytes
Implementation ensures strong customer protection and quick support
Pros and Cons
- "The deployment is very easy."
- "A few years back, we had an attack on one of our biggest clients."
- "Some reporting areas need improvement."
- "Some reporting areas need improvement. We need to generate more reports."
What is our primary use case?
Many of our firms are currently using ThreatLocker, and they have been very happy with it. It can block unauthorized software from being downloaded.
How has it helped my organization?
A few years back, we had an attack on one of our biggest clients. After that, we implemented ThreatLocker. For the last couple of years, there have been no issues or attacks. This has been really helpful.
What is most valuable?
Currently, we are not using the full range of modules, however, we are using ThreatLocker elevation. That's really good.
The deployment is very easy.
We've been able to save some operational costs and expenses by using this product. However, the main thing is that it protects our customers.
The zero-trust endpoint availability is good. It can block unknown applications straight away.
We have reduced help desk tickets. It helps with management. We have a good team in place.
What needs improvement?
Some reporting areas need improvement. We need to generate more reports. That area should be improved. We'd like reporting on if someone tried to install software, we'd like to be able to generate reports on what was blocked.
For how long have I used the solution?
I have been using ThreatLocker for the past four years.
What do I think about the stability of the solution?
Stability is good; it is a growing business. Over the last four years, it has grown significantly.
What do I think about the scalability of the solution?
Scalability is good. There has been no impact in the last couple of years.
How are customer service and support?
Support is good, with very quick support from Cyber Heroes if any staff requires help. From our side, they are really helpful.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not use another solution previously.
How was the initial setup?
The initial setup is good; deploying is very easy.
What about the implementation team?
We are managing the implementation ourselves.
What was our ROI?
It's protecting our customers. That is the main thing. That's our ROI.
What's my experience with pricing, setup cost, and licensing?
In the last couple of years, the price has remained the same. Nothing has changed, and it's good. I hope it will not increase soon.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
The overall rating of the solution is eight out of ten. We need to improve the reporting side, including reporting and generating reports. That area needs to be improved.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Security team architect at TOTVS
Security control and audit features have increased our protection and customer confidence
Pros and Cons
- "The control list is the best feature. For our company, it provides value to our customers since they can see we are improving our security."
- "We are seeing a return on investment, especially with our managers and customers."
- "There could be options for handling a bulk amount of machines simultaneously."
- "I have encountered some problems with stability, however, they are resolved quickly."
What is our primary use case?
We're currently deploying 15,000 machines. For us, it is quite easy, however, the problem is that our environment is complicated to deploy due to many customizations. That said, with ThreatLocker, it is not a problem.
How has it helped my organization?
It's getting better in terms of cost and transparency. We can see security improving and can show our evolution.
What is most valuable?
The control list is the best feature. For our company, it provides value to our customers since they can see we are improving our security. It also helps us understand what is happening in the machines with notify audits. The solution shows evolution and helps us troubleshoot, even when installed on only some machines.
We can reduce attack surface. We have over 1500 sysadmins, and without it, it was hard to control permissions.
We hope in the future it will help us reduce costs.
We can block access to unauthorized applications. With all of the sysadmins, it had been quite difficult to block everything manually. We have more control over our environment now.
It helps us to see what's happening in the environment and can help us troubleshoot. Once we install across all machines, we can see better what's happening.
What needs improvement?
There could be options for handling a bulk amount of machines simultaneously. Randomizing the actions instead of executing everything at once would be beneficial. This would apply to our policies, particularly for the container and Linux versions.
For how long have I used the solution?
We have been using it for about one year and six months, almost two years.
What do I think about the stability of the solution?
I have encountered some problems with stabilitiy, however, they are resolved quickly. It is not really a significant issue for me, as they are solved very fast.
What do I think about the scalability of the solution?
The scalability is okay for us. We do not have any problems.
How are customer service and support?
The customer service is very good and very fast.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Previously, we used another solution, including a solution from ManageEngine. We switched to ThreatLocker because we felt secure using it, especially with Cyber Heroes and the learning mode.
What about the implementation team?
The implementation was done in-house by me.
What was our ROI?
We are seeing a return on investment, especially with our managers and customers. We are protecting them and enhancing our security. They all feel safer with this solution.
What's my experience with pricing, setup cost, and licensing?
The setup cost is good, but money in Brazil is quite expensive. Despite the Brazilian economic issues, it is manageable when considering the dollar.
Which other solutions did I evaluate?
We just have one alternate solution in mind, which includes control mechanisms. We tested some others but liked this one a lot. We need to finish the first part.
What other advice do I have?
My overall product rating is nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Tier 1 IT Engineer at a retailer with 11-50 employees
There are overall fewer breaches, as nothing can be run without prior approval
Pros and Cons
- "Being able to protect and trust nothing by default, known as zero trust, is the most important feature to me."
- "Being able to protect and trust nothing by default, known as zero trust, is the most important feature to me."
- "The user experience could be improved."
- "The user experience could be improved. Most complaints we get are based on users wanting certain functionality."
What is our primary use case?
I have a lot of clients, and I am responsible for protecting them by ensuring their environments are safe and up-to-date.
How has it helped my organization?
The major benefit is just fewer breaches overall. No one can run anything without it being approved first. ThreatLocker is helping companies protect themselves.
What is most valuable?
Being able to protect and trust nothing by default, known as zero trust, is the most important feature to me. The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
Attack surfaces are easy to control. It's easy to deploy and protects very well.
We've been able to consolidate security tools using ThreatLocker. We used to use SentinelOne and it wasn't doing exactly what we wanted. It wasn't detecting anything.
It's great at blocking access to unauthorized applications. By default, it trusts nothing.
We do get more tickets for application requests, however, that's not a bad thing, since it's protecting our environment.
What needs improvement?
The user experience could be improved. Most complaints we get are based on users wanting certain functionality. For the most part, built-in applications are pretty good, however, having more would be beneficial.
For how long have I used the solution?
I have been using it for about two to three years now.
What do I think about the stability of the solution?
It has great stability without any negative aspects.
What do I think about the scalability of the solution?
I believe it's scalable, whether the client is small or large. It is beneficial regardless of the size.
How are customer service and support?
I have experienced amazing support. Whenever I have an issue, I click the chat button, and someone is always available to assist me. Escalations go smoothly, and I have never encountered support issues.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used to use a tool called SentinelOne before switching to ThreatLocker. SentinelOne was not meeting my needs and did not detect issues effectively. I now also use Huntress, but ThreatLocker has been a huge help by blocking anything unapproved.
How was the initial setup?
I deployed it with our RMM, which made it really easy. It was much simpler than it would be with a different program. I set up the tenant, changed a few settings, checked a box, and deployed it. The process was fast and efficient, with the devices appearing quickly and no slowness.
What was our ROI?
I would stress the importance of saving companies from breaches. The cost versus benefit of ThreatLocker is significant, as its small cost offers great advantages. If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
What other advice do I have?
In meetings, they mention 'set it and forget it.' While this can be efficient, it might leave applications unaudited over time, possibly opening vulnerabilities. Regular auditing and reviews would enhance security.
I give it a nine out of ten overall, recognizing there is room for improvement.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Director at a tech services company with 11-50 employees
Consolidated security tools have simplified compliance and reduced daily operational stress
Pros and Cons
- "Network Control, Application Control, and Storage Control impact my daily workflow significantly, as they give me operational freedom with cyber hero support, reduce the anxiety I have day-to-day, and have improved my overall general mental health because of all of the never feeling alone being reduced to near zero, with a whole team of cyber heroes that are just jumping to help me, and the turnaround is literally a minute in most cases."
- "I have several clients in the last few months that have definitely caused a problem where a domain controller completely destroyed replication once Network Control was put in place, and now our AVD servers in Azure also lose domain trust occasionally and it is intermittent, making it rather hard to prove to ThreatLocker Zero Trust Endpoint Protection Platform that they really need to look at when there is a VPN in the middle of a domain controller."
What is our primary use case?
My main use case for ThreatLocker Zero Trust Endpoint Protection Platform was Application Control, but now I use it as a full suite of protection tools.
A specific example of how I use ThreatLocker Zero Trust Endpoint Protection Platform as a full suite of protection tools in my organization is that it helps us perform compliance needs for companies and also Web Control, Application Control, and Network Control as a true zero-trust platform.
How has it helped my organization?
It has made a positive impact by consolidating our tools; we used to have too many tools and now we really only need ThreatLocker Zero Trust Endpoint Protection Platform, a backup solution, and our RMM.
I have seen benefits from consolidating my security tools down to just ThreatLocker Zero Trust Endpoint Protection Platform, a backup solution, and my RMM, as it has saved me time, saved my clients money, and saved us headaches.
What is most valuable?
The best features ThreatLocker Zero Trust Endpoint Protection Platform offers are Network Control, Application Control, and Storage Control.
Network Control, Application Control, and Storage Control impact my daily workflow significantly, as they give me operational freedom with cyber hero support, reduce the anxiety I have day-to-day, and have improved my overall general mental health because of all of the never feeling alone being reduced to near zero, with a whole team of cyber heroes that are just jumping to help me, and the turnaround is literally a minute in most cases.
What needs improvement?
ThreatLocker Zero Trust Endpoint Protection Platform can be improved by addressing issues with Network Control better.
I have several clients in the last few months that have definitely caused a problem where a domain controller completely destroyed replication once Network Control was put in place, and now our AVD servers in Azure also lose domain trust occasionally and it is intermittent, making it rather hard to prove to ThreatLocker Zero Trust Endpoint Protection Platform that they really need to look at when there is a VPN in the middle of a domain controller.
For how long have I used the solution?
I have been using ThreatLocker Zero Trust Endpoint Protection Platform for almost three years.
How are customer service and support?
I do not wish to add anything else about the features or the support I receive.
How would you rate customer service and support?
Positive
What other advice do I have?
I would rate ThreatLocker Zero Trust Endpoint Protection Platform a nine out of ten, but it would be ten stars if they would just get this last thing solved for us. My overall rating for this product is nine out of ten.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 5, 2026
Flag as inappropriateCyber Security Specialist at Bremmar Consulting
Application control automation improves efficiency and time investment
Pros and Cons
- "The application control is a key feature of ThreatLocker."
- "ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent."
- "When I first came on board, it was trickier to learn."
- "Initially, the learning curve was slightly high for me, however, that has been resolved now."
What is our primary use case?
I have a security service that I sell to my customers, which I provide along with ThreatLocker to deploy one of the essential eight controls.
How has it helped my organization?
We've helped to reduce overhead while managing at a large scale.
What is most valuable?
The application control is a key feature of ThreatLocker. By using ThreatLocker, I have reduced the overhead of managing application control, eliminating the need for my engineers to manually add applications.
ThreatLocker automates this process efficiently, allowing me to manage it on a large scale for all of my clients, as well as internally. It helps me produce greater efficiency.
It's easy for IT teams to use regarding reducing attack surfaces. It's easy for us. We can manage everything quite easily.
It's been able to help us eliminate and consolidate security tools. We were using a lot of Windows components and have since gotten rid of them.
We have saved on operational costs. We were spending about four to six hours a week managing requests and now were down to about two hours.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent. It's also helped us to provide efficiencies elsewhere and, therefore, invest our time in other things that could benefit us tremendously. It has freed up time by 10% to 20%.
What needs improvement?
Initially, the learning curve was slightly high for me, however, that has been resolved now. They made a lot of improvements. When I first came on board, it was trickier to learn. Besides that, I can't see much else needing improvement at this stage. ThreatLocker University might offer more now, with additional learning and certifications. Previously, I only had a few demo and engineering sessions and had to learn the rest by myself.
It would be nice if they provided more than an EDR and have an antivirus component to go along with it.
For how long have I used the solution?
I have been using the solution for about a year and a half now.
What do I think about the stability of the solution?
The stability had a few hiccups at the start, however, they've worked through a lot of their issues and are pretty responsive in fixing them.
What do I think about the scalability of the solution?
I find scalability quite good.
How are customer service and support?
Customer service has been great. I don't have much experience directly with them, however, I would rate it a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used just Windows Defender Application Guard control.
How was the initial setup?
My experience with deployment was straightforward, easy to do, and worked well. I initially rolled it out to one or two clients as a trial and then expanded it to all clients.
What about the implementation team?
I did not use an integrator, reseller, or consultant for deployment.
What was our ROI?
The time efficiency I gained has allowed me to invest in other areas of the business. Additionally, I provide a lot of compliance services and communicate my processes to customers efficiently and safely.
What's my experience with pricing, setup cost, and licensing?
The setup cost has been great. I had a really good deal at the time, and it continues to be cost-effective.
Which other solutions did I evaluate?
I considered Blackpoint as one of the options.
What other advice do I have?
The overall product rating is nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partners
System administrator at Total Technology Solutions
Customer service excels and application control boosts efficiency, reducing help desk tickets
Pros and Cons
- "The application control is highly valued by me."
- "ThreatLocker saves me a couple of hours per day dealing with threats and encrypting efforts elsewhere."
- "We use other vendors for other components. I'd like one vendor to control all aspects of the business, including backup, EDR solutions, email monitoring, and control, rather than using multiple vendors."
What is our primary use case?
I deploy ThreatLocker to my clients who sign up with my service agreement. I coordinate the deployment and monitoring of the software and programs.
Periodically, I manage the alerts and respond to requests by either approving or denying them, depending on the case.
How has it helped my organization?
ThreatLocker provides a lot of peace of mind. We don't have to worry something is going to get in and run in the background in the night hours. It's more so for our control and monitoring purposes.
What is most valuable?
The application control is highly valued by me. The ring fencing and storage management are also important, however application control is my go-to feature. The solution helps provide me with peace of mind and control. It assists me in reducing help desk tickets by automating processes and allows IT teams to focus on other projects.
ThreatLocker saves me a couple of hours per day dealing with threats and encrypting efforts elsewhere. It helps me run reports ahead of time to avoid wasting time.
It's easy for IT teams to use. Cyber Hero Support is always there is we get stuck.
We've been able to save operation costs. With the automation and policies that are in place for application control, we're not finding ourselves wasting time monitoring or resolving issues. Our efforts are now being deployed elsewhere.
It's very good at blocking unauthorized applications. We had to manage policies through the server and it was more tedious. With ThreatLocker, we definitely see the benefits.
We have reduced our help desk tickets with the help of automation. There's a lot of reporting to help us block and avoid wasting time. Our IT teams can use the time on other projects. Agents can handle other phone calls. We have more resources available.
Without ThreatLocker, responding to threats might take an hour or two. With the solution, this is sped up. We can save hours a day since threat response has been sped up.
What needs improvement?
It's only been a short amount of time. We do need more time with it and be more acquainted with the software.
We use other vendors for other components. I'd like one vendor to control all aspects of the business, including backup, EDR solutions, email monitoring, and control, rather than using multiple vendors.
For how long have I used the solution?
I have been using it for about ten months.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable.
How are customer service and support?
Customer service is excellent, with Cyber Hero Support being responsive within a minute or two. There are regular communications with an account manager and a support agent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no Zero Trust solution before this, however, I had other EDRs and vendors.
How was the initial setup?
The setup was pretty easy for me. I use another tool, an RMM tool, that helps me automate deployment. Setting up the organization on the portal was straightforward due to built-in applications and policies.
What about the implementation team?
The deployment was supported by an RMM vendor. I found no issues.
What was our ROI?
It frees up my time for technicians to focus on other projects, providing me with an overall definite benefit.
What's my experience with pricing, setup cost, and licensing?
The cost is very competitive. The pricing model works for me and can be passed to clients as part of their monthly service agreement.
Which other solutions did I evaluate?
I did not evaluate other solutions before picking this one.
What other advice do I have?
ThreatLocker's modules, knowledge base, ThreatLocker University, and resources are very helpful for me. Policies and policy auditing formats are clear and easy to use.
The overall product is rated ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Buyer's Guide
Download our free ThreatLocker Zero Trust Platform Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2026
Product Categories
Endpoint Protection Platform (EPP) Network Access Control (NAC) Advanced Threat Protection (ATP) Application Control ZTNA as a Service ZTNA Ransomware ProtectionPopular Comparisons
Fortinet FortiGate
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cortex XDR by Palo Alto Networks
SentinelOne Singularity Endpoint
Cloudflare One
Microsoft Defender for Office 365
Varonis Platform
Zscaler Zero Trust Exchange Platform
Cisco Identity Services Engine (ISE)
Trellix Endpoint Security Platform
WatchGuard Firebox
Cato SASE Cloud Platform
Fortinet FortiClient
Buyer's Guide
Download our free ThreatLocker Zero Trust Platform Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?
- Are you aware of SIEM platforms that integrate both Active Directory auditing and security monitoring tools?
- What is the best solution for ransomware attack?















