I work for an architecture firm. We use ThreatLocker Protect to protect the company's systems from unknown malware by blocking unapproved applications. We encounter a lot of malware and ThreatLocker has been able to help with that.
Senior System Administrator at Molders Group Limited
Highly effective at controlling applications and securing our systems
Pros and Cons
- "The application whitelisting feature allows us to block and manage approved applications effectively. It ensures that no one can install an application on our systems unless it is approved by me, which is very efficient."
- "ThreatLocker Protect has improved my organization greatly."
- "The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
- "The support could be quicker."
What is our primary use case?
How has it helped my organization?
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable
ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it.
Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure.
ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth.
We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware.
ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations.
ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.
What is most valuable?
The application whitelisting feature allows us to block and manage approved applications effectively. It ensures that no one can install an application on our systems unless it is approved by me, which is very efficient.
It is very easy to use. When a user sends a request, you can go to the dashboard to view the application that the user wants you to approve. If you are okay with the application, you just click the Approve button to approve. It is very easy.
What needs improvement?
The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed.
The stability can also be better.
Buyer's Guide
ThreatLocker Zero Trust Platform
February 2026
Learn what your peers think about ThreatLocker Zero Trust Platform. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,266 professionals have used our research since 2012.
For how long have I used the solution?
I have been using ThreatLocker Protect for the past three years.
What do I think about the stability of the solution?
Stability can be improved as there are times it goes down or requires management to adjust policies. I would rate stability a six out of ten.
What do I think about the scalability of the solution?
It is scalable to an extent, depending on where it is used. I would rate scalability a seven out of ten.
We have one location but multiple departments. Overall, we have 25 users.
Our company is small. I know which applications each user is supposed to use and what they need. Once I get a request, I go over to the application they need to install. If it aligns with the work they do, I approve it.
How are customer service and support?
I would rate their support a five out of ten. It could be better, especially with response times.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not use another solution before.
How was the initial setup?
The initial setup was straightforward. Its deployment took about a week.
What was our ROI?
Our return on investment with ThreatLocker is about 20%.
Its time to value was immediate.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable and normal. I do not have any problems with the cost.
What other advice do I have?
I would recommend ThreatLocker Protect to other users as it is a very important tool for IT administrators like me. It helps manage user access and secures the system efficiently.
I would rate ThreatLocker Protect an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Founder
Zero Trust factor and Cyber Hero support make it a great solution
Pros and Cons
- "The Zero Trust factor is valuable because it blocks everything. That helps us to stay ahead of bad actors. We do not have to be in recovery mode."
- "I would rate it a ten out of ten."
- "I have no complaints, but a little bit more Mac support would be great."
- "It has not reduced helpdesk tickets. It has probably increased them by blocking applications and doing its job, resulting in people raising more tickets to know why they cannot use certain things."
What is our primary use case?
I primarily use it for protecting my clients.
How has it helped my organization?
I can sleep well at night. At the end of the day, it provides me with peace of mind.
It has helped to eliminate other security solutions. We do not need as many. We do not use many because we can trust the solution. We were using Sophos. That is completely gone. We are using Penetrates as well because it works very well with ThreatLocker.
It has been great at blocking access to unauthorized applications. It is almost perfect. We deal with developers who use a lot of tools. From a security standpoint, it is very important because we know what is going on. It gives us more visibility.
It has not reduced helpdesk tickets. It has probably increased them by blocking applications and doing its job, resulting in people raising more tickets to know why they cannot use certain things.
It has not freed up the IT team’s time for other projects or tasks, but it is doing its job. It is a good one.
What is most valuable?
The Zero Trust factor is valuable because it blocks everything. That helps us to stay ahead of bad actors. We do not have to be in recovery mode.
It is light. It does not give that weird heaviness. It just works.
What needs improvement?
So far, it has been great. The Cyber Hero support system is excellent. I have no complaints, but a little bit more Mac support would be great.
It is very easy, but having a dashboard so that we can visualize more might be helpful.
For how long have I used the solution?
I have used the solution for about a year.
What do I think about the stability of the solution?
It is great. We have had no issues so far.
What do I think about the scalability of the solution?
It seems great, but we are still growing. We will know in a year.
How are customer service and support?
Cyber Hero's support is excellent, allowing me to talk to a live person, which is significant. It has been amazing.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had a bad experience with Sophos. We have industrial printers that we use, and they would just lock in. There was no visibility. We did contact Sophos, but they did not have any solution. The manufacturer also did not have a solution. We just could not figure it out. It was hindering the production.
How was the initial setup?
The initial setup was seamless and very easy. We use Datto RMM.
What about the implementation team?
We implemented it ourselves.
What was our ROI?
We are still small. We are still growing, so we are not at the stage to know about the ROI or any reductions in the operational costs.
What's my experience with pricing, setup cost, and licensing?
So far, it has been great. I have no complaints. Of course, everybody wishes it was cheaper.
What other advice do I have?
It does what it is supposed to do. Just knowing that it works as intended is reassuring. There are a lot of other EDR software, but you do not know if they are doing their job. With ThreatLocker, I can tell that it works.
I would rate it a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Buyer's Guide
ThreatLocker Zero Trust Platform
February 2026
Learn what your peers think about ThreatLocker Zero Trust Platform. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,266 professionals have used our research since 2012.
Technical Director at a tech services company with 11-50 employees
Consolidated security tools have simplified compliance and reduced daily operational stress
Pros and Cons
- "Network Control, Application Control, and Storage Control impact my daily workflow significantly, as they give me operational freedom with cyber hero support, reduce the anxiety I have day-to-day, and have improved my overall general mental health because of all of the never feeling alone being reduced to near zero, with a whole team of cyber heroes that are just jumping to help me, and the turnaround is literally a minute in most cases."
- "I have several clients in the last few months that have definitely caused a problem where a domain controller completely destroyed replication once Network Control was put in place, and now our AVD servers in Azure also lose domain trust occasionally and it is intermittent, making it rather hard to prove to ThreatLocker Zero Trust Endpoint Protection Platform that they really need to look at when there is a VPN in the middle of a domain controller."
What is our primary use case?
My main use case for ThreatLocker Zero Trust Endpoint Protection Platform was Application Control, but now I use it as a full suite of protection tools.
A specific example of how I use ThreatLocker Zero Trust Endpoint Protection Platform as a full suite of protection tools in my organization is that it helps us perform compliance needs for companies and also Web Control, Application Control, and Network Control as a true zero-trust platform.
How has it helped my organization?
It has made a positive impact by consolidating our tools; we used to have too many tools and now we really only need ThreatLocker Zero Trust Endpoint Protection Platform, a backup solution, and our RMM.
I have seen benefits from consolidating my security tools down to just ThreatLocker Zero Trust Endpoint Protection Platform, a backup solution, and my RMM, as it has saved me time, saved my clients money, and saved us headaches.
What is most valuable?
The best features ThreatLocker Zero Trust Endpoint Protection Platform offers are Network Control, Application Control, and Storage Control.
Network Control, Application Control, and Storage Control impact my daily workflow significantly, as they give me operational freedom with cyber hero support, reduce the anxiety I have day-to-day, and have improved my overall general mental health because of all of the never feeling alone being reduced to near zero, with a whole team of cyber heroes that are just jumping to help me, and the turnaround is literally a minute in most cases.
What needs improvement?
ThreatLocker Zero Trust Endpoint Protection Platform can be improved by addressing issues with Network Control better.
I have several clients in the last few months that have definitely caused a problem where a domain controller completely destroyed replication once Network Control was put in place, and now our AVD servers in Azure also lose domain trust occasionally and it is intermittent, making it rather hard to prove to ThreatLocker Zero Trust Endpoint Protection Platform that they really need to look at when there is a VPN in the middle of a domain controller.
For how long have I used the solution?
I have been using ThreatLocker Zero Trust Endpoint Protection Platform for almost three years.
How are customer service and support?
I do not wish to add anything else about the features or the support I receive.
How would you rate customer service and support?
Positive
What other advice do I have?
I would rate ThreatLocker Zero Trust Endpoint Protection Platform a nine out of ten, but it would be ten stars if they would just get this last thing solved for us. My overall rating for this product is nine out of ten.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 5, 2026
Flag as inappropriateProject Engineer at Lutz M&A, LLC
Does its job very well and is great at blocking access to unauthorized applications
Pros and Cons
- "The application management on any workstation with the solution is valuable. I find it valuable that it indicates whether the software is part of our pre-approved list, adding a nice layer of protection. It works great because people cannot just install or download any app from the web."
- "ThreatLocker Zero Trust Endpoint Protection Platform has helped reduce the incidents of clients getting exploits or ransomware put on their devices by 110 times."
- "ThreatLocker University offers many good training modules, but more in-depth training for advanced platforms would be beneficial."
What is our primary use case?
Our use case involves endpoint protection, ensuring that nothing harmful reaches any of our clients' workstations.
How has it helped my organization?
ThreatLocker Zero Trust Endpoint Protection Platform has helped mitigate security threats and reduce the risk of ransomware and data breaches.
ThreatLocker Zero Trust Endpoint Protection Platform has not helped replace any solution, but with most things in security, there are different layers. It is definitely the front of the shield. It does what it needs to do and is a very good product.
ThreatLocker Zero Trust Endpoint Protection Platform is very good at blocking access to unauthorized applications. I have seen it block several different types of nasty exploits. It is always interesting to see stuff come through that. It is also about how you manage your environment. At the end of the day, you have to make sure you set your filters correctly. If you do not set your filters correctly, you are going to have a hole somewhere. Right off the back, the way it works is great.
ThreatLocker Zero Trust Endpoint Protection Platform has helped reduce help desk tickets. It has helped reduce the incidents of clients getting exploits or ransomware put on their devices by 110 times.
Reducing help desk tickets using ThreatLocker Zero Trust Endpoint Protection Platform has helped free up our IT team’s time for other projects or tasks. It probably saves a couple of hours a day. Having ThreatLocker on our devices does help protect all our clients and our organization, and that allows us to review and remediate other security concerns.
What is most valuable?
The application management on any workstation with the solution is valuable. I find it valuable that it indicates whether the software is part of our pre-approved list, adding a nice layer of protection. It works great because people cannot just install or download any app from the web. Anything unapproved gets blocked.
What needs improvement?
ThreatLocker University offers many good training modules, but more in-depth training for advanced platforms would be beneficial. I believe having more detailed information would be great. There could be a portal where others can provide suggestions that we can review.
For how long have I used the solution?
I have been using this solution for about two years.
What do I think about the stability of the solution?
It is very stable. I would rate it a nine out of ten for stability.
What do I think about the scalability of the solution?
Its scalability is great. They have many other services included, and I believe we are only using one or two. Personally, I would like to see us use more, but it is about having layers and more than one solution to back us up. I would rate it a ten out of ten for scalability.
How are customer service and support?
ThreatLocker's support is great. We have a good response time and a strong conversation with Rob and all the other team members there. I would rate them a ten out of ten.
How would you rate customer service and support?
Positive
What was our ROI?
The main return on investment is peace of mind, knowing that with ThreatLocker on any endpoint, it will almost always block all malicious code or exploits, even zero-day exploits. If an unknown or unapproved program is run, it is blocked for review, making us better at our job. If the client is trying to run something that is not in our system and the hash does not exist, it will be blocked for us to review, which then makes us better at our job.
What other advice do I have?
It is easy to use, but you need to understand how it works from a high level. It requires an in-depth understanding of IT teams. A lot of time, people think they know what they are doing, but they set things that should not be set in the learning mode. They then have to go back and find them and remove them.
I have not seen any security defense solution quite like ThreatLocker Zero Trust Endpoint Protection Platform. There are other companies trying to achieve the same. With recent third-party issues, I have not observed ThreatLocker causing outages. It works very well, providing peace of mind. It is a great product.
Overall, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Service Desk Analyst II & Endpoint Administrator at a insurance company with 201-500 employees
Unified Audit has uncovered hidden application interactions and improved access control
Pros and Cons
- "Unified Audit is excellent for identifying our denies and using those to dynamically create rules, as opposed to manually observing the logs and creating them. It saves so much time."
- "Overall, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a ten out of ten."
- "To become the best solution, some sort of integration or remote management, like remotely connecting, could be beneficial."
What is our primary use case?
I use all of the modules except for Detect right now. We use application control because we have many enterprise applications. Many of them require different levels of elevation or different access to various endpoints. Leveraging that, in addition to storage control, has been significant. We have not yet built out our network control but have been using application control.
How has it helped my organization?
ThreatLocker Zero Trust Endpoint Protection Platform has not only served well in replacing some other security applications; it has also helped uncover application interactions that we were not aware of with Unified Audit.
ThreatLocker Zero Trust Endpoint Protection Platform has been incredibly useful. I have completed the online Cyber Hero training. After going through that, I feel I have a pretty comprehensive understanding of the product. Using that knowledge, we have been able to uncover some application interactions we were not even aware of before.
ThreatLocker Zero Trust Endpoint Protection Platform has not yet helped us consolidate applications and tools. We brought it on just recently. We previously had a fairly complete suite, but it will be replacing several of the tools. It has not yet helped our organization save on operational costs or expenses, but it will do that soon.
ThreatLocker Zero Trust Endpoint Protection Platform is highly capable of blocking access to unauthorized applications. I am very satisfied with the granularity of control.
ThreatLocker Zero Trust Endpoint Protection Platform has not yet helped reduce help desk tickets. We still use some other applications to manage configurations. We will be using ThreatLocker's Configuration Manager for one point of control. It will help in the future. It has not yet, but I can see it coming. I am really excited about it.
ThreatLocker Zero Trust Endpoint Protection Platform has freed up help desk staff for other projects with Unified Audit. Dynamically adding to the application definitions or modifying policies is quick and easy. We work in health care, so everything is very thoroughly audited. There are times when I lose an entire day because the security auditor does not have access to everything going on. We then have to pull reports from everywhere. With Unified Audit, we have all the information we need in one location. It saves about at least four or five days out of the month, which is pretty significant.
What is most valuable?
Unified Audit is excellent for identifying our denies and using those to dynamically create rules, as opposed to manually observing the logs and creating them. It saves so much time. It ensures that the Zero Trust Platform functions effectively. Otherwise, the manual labor required would render it unusable.
It combines application control and network control. It brings all the Windows settings that we were previously controlling through GPOs and Intune configuration settings into one place. We have been able to watch all of these critical controls from one place through Unified Audit.
What needs improvement?
I have not run into any shortcomings yet. To become the best solution, some sort of integration or remote management, like remotely connecting, could be beneficial. I can adjust many configuration settings, but being able to perform remote maintenance when the device is unattended and providing remote support would be helpful.
For how long have I used the solution?
I have been using it for about a month and a half.
What do I think about the stability of the solution?
It is 100% stable. I have confidence in it. It has been doing everything that we hoped it would do.
What do I think about the scalability of the solution?
We do not have all of our endpoints locked down yet. With the flexibility of both the stub and the MSI installer, scaling it to the rest of the organization is going to be very easy, likely requiring just two clicks.
How are customer service and support?
Their support has been fantastic. It has been absolutely outstanding. We have Cyber Hero support, and they are always so quick and super knowledgeable. The rest of our representatives have been very friendly and quick to help. I would rate them a ten out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We use a handful of solutions. I have recently been brought onto our security team. We use CrowdStrike as our main security vendor at present.
How was the initial setup?
Deployment is very easy. There are, I believe, three or four different installation options. We use Intune for managing our applications. I was the one who built the installer, and it was a five-minute process. There was no additional scripting involved, which was amazing.
What about the implementation team?
We did it in-house.
What was our ROI?
There has been more granular control, especially with locking things down by processes and files. There are a lot of gaps that it is filling. It is addressing many of my needs. It gives me more confidence. I have been able to sleep better at night.
Which other solutions did I evaluate?
I did not consider any alternate solutions.
What other advice do I have?
Overall, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cybersecurity at a tech services company with 11-50 employees
No-sweat security with excellent application control and alerting
Pros and Cons
- "ThreatLocker Zero Trust Endpoint Protection Platform provides no-sweat security that we can easily deploy. We do not worry about our habitual clickers because we receive an alert if they try to do something, and we know ThreatLocker has already taken care of it."
- "ThreatLocker Zero Trust Endpoint Protection Platform provides no-sweat security that we can easily deploy."
- "The Cyber Hero certification exam could use a bit of love, but overall, I have been very satisfied with the platform."
What is our primary use case?
We work with small businesses, and we are slowly rolling it out. We have implemented ThreatLocker for about 30 clients to protect those who are habitual clickers and those with compliance demands.
How has it helped my organization?
ThreatLocker Zero Trust Endpoint Protection Platform provides no-sweat security that we can easily deploy. We do not worry about our habitual clickers because we receive an alert if they try to do something, and we know ThreatLocker has already taken care of it.
We are large for an MSP, but we are relatively new to security. We only have about three people. It helps us because we know that things are automatically going to be blocked. We do not have to worry about somebody at a company downloading Epic Games installers every fortnight or every Ccleaner app they can find. We know that will be taken care of. It just allows us to focus on other areas where we need to be. We are trying to get big clients. It allows us to focus on that and not worry about applications.
The automatic script generation and the number of install methods make it incredibly easy to put out. It automatically adds them to the portal. It is very easy to implement as long as you have tools in place that allow you to access those systems. For example, if you are implementing for the first time and do not have remote access to your system, it could be difficult. For us, it is incredible. We do not have to be hands-on. We just push it out.
ThreatLocker Zero Trust Endpoint Protection Platform has saved operational costs or expenses. Especially with clients who are heavy clickers, the work on remediation has been amazing. Once deployed to a client, we do not worry about them anymore. Manpower reduction has been significant. It is deployed to a small percentage of our clients, resulting in a 30% to 40% reduction in manpower for those clients.
Knowing that it automatically blocks unwanted applications allows us to focus on other areas. The other day somebody downloaded a fake Geek Squad, and I did not have to worry about it. I got the alert.
ThreatLocker Zero Trust Endpoint Protection Platform has helped a little bit to reduce help desk tickets. It is for our heavy clickers group, but they are still a very small portion. Once we get it out to more and more clients, it will do even more.
ThreatLocker Zero Trust Endpoint Protection Platform allows us to focus on other areas. We are working towards compliance and other things, without worrying about their applications. It saves at least 10 to 15 hours a month, which does not seem like a lot, but we have a very small team. It adds up quickly.
What is most valuable?
Currently, we are only using default-deny application control and ringfencing. We are considering implementing elevation control and storage control, but those are in the beta stages. Application control and ringfencing are what we use most, and we rely on them for many of our clients.
What needs improvement?
That is challenging to answer because, in the areas we are working, we have been very happy. The improvements we need are more focused on user training than on ThreatLocker itself. They are constantly improving the platform. The Cyber Hero certification exam could use a bit of love, but overall, I have been very satisfied with the platform.
For how long have I used the solution?
As a company, we have used it for almost four years. I am new to the team, so it has been about eight months for me.
What do I think about the stability of the solution?
I have not experienced any downtime with it, so I would rate it very high. We thought we had a ThreatLocker issue once, but it turned out to be a Comcast issue blocking ThreatLocker access.
What do I think about the scalability of the solution?
The scalability is very high. It is very easy to scale.
How are customer service and support?
Customer support has been very good. Whenever we have had issues with a couple of scripts, we contacted Cyber Heros support and said, "We need to figure out how to get this blocked without allowing that," and they have always been very quick to assist.
I would rate them a ten out of ten. I have never had an issue with contacting them or them not being able to help.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use any other solutions for application security before this. It was the first one we implemented after discovering a need.
How was the initial setup?
The setup was pretty seamless. We generate a script and deploy it through our infrastructure and managed service team. We verify that everything is in place, and during the onboarding process, within a few hours, the machines report that it is already implemented.
What about the implementation team?
We implement it in-house.
What was our ROI?
It has saved time and provided safety. We are also able to work on compliance. We were able to get more business from someone because we could do this. It got us some more work.
What other advice do I have?
I would rate ThreatLocker Zero Trust Endpoint Protection Platform a ten out of ten. It is the only solution we know that does what it does. Customer service is a significant factor. We had a client who was a habitual clicker, and after implementing ThreatLocker, I received a call saying, "I did something," but I could see it was already blocked. The difference in response between reacting to a malware alert and knowing ThreatLocker handled the issue is substantial.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Executive Officer at Triada Networks
Granular control, exceptional support, and a massive reduction in alerts
Pros and Cons
- "Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc."
- "It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
What is our primary use case?
We use ThreatLocker Protect along with ringfencing and elevation.
We include it as part of our managed service for our clients. Our clients are aware of the tool, but they are not buying it. We package it as a part of a service.
How has it helped my organization?
When we look at security on the endpoint, there are two parts to it. One is blocking known bad things and then setting an allowlist for the things that you want to run. Defining allowlisting reduces the attack surface just to the known good applications. It also reduces the number of false positives that we need to chase when it comes to things that hit our endpoint detection or response, which is more of our known bad or behavioral-based security endpoint. So, we pair the two together.
Allowlisting helps to keep the environment clean. More and more applications do not require admin rights to install. Even if you limit the ability for a user to install applications, they can still run some things on their own such as browser plugins. We know that browser plugins can be potentially very dangerous because they sit in a browser, and that is where most people do their work. They can become a problem. Allowlisting helps to put guardrails around what is allowed to run. By keeping the environment clean, the programs perform better. They are more secure, and there is less noise for us to chase when it comes to actual security events.
It is easy for administrators to approve or deny requests using allowlisting. They have two ways for administrators to approve or deny requests. They can do it in a managed way, where they do it for you using Cyber Hero. We do not do it that way. We are an old customer of ThreatLocker. We have been using it before they had Cyber Hero in place. Originally, we thought it was going to be problematic because allowlisting tends to be very hard to implement. Most of the other allowlisting systems, such as Microsoft's AppLocker, are very difficult to implement and maintain, but ThreatLocker does two things. When it comes to very common applications, they work with vendors. They are always looking at the new installations and making sure they are constantly up to date, so you do not have to always approve those things. But, of course, things happen, and sometimes they happen in the middle of the night when somebody is doing something and needs help. The nice thing about it is that it is fairly easy to approve. We can approve even with a mobile app. I have had the ThreatLocker mobile app since they introduced it a year or two years ago. If one of our clients in Australia or somewhere else is doing something, I can easily approve it without having to get up from my chair. I can approve it after doing a quick review of what they are installing. If I want to do a little bit deeper check, I can do that, but most of the time, there are just basic things, and we can approve them on the fly. The portal gives us a lot of granularity in terms of not only approvals but also how to approve them. We can choose to approve something for a person, the entire company, or all of our clients. We can choose to approve only the hash or a particular version of a particular executable or any application that is signed by a company. We can define how loose or tight we want to be when it comes to certain applications. They have recently also introduced time-based approval. We can give approval for only a period of time, and then the approval goes away. If somebody needs to run something, but we do not want it to be allowed to run for a long period of time, we can implement that.
In terms of access requests, we control what is allowed and what is not allowed. They have curated things on our behalf for Windows, Office, Chrome, Firefox, and a whole slew of other applications, but you do not have to add those. You can curate your own list. For example, we have an engineering company, and the applications that they use are not used by anybody else. They are very bespoke for their specific industry. We get new requests from them all the time. We check if it is something that looks nefarious. Is it on VirusTotal? Are there any other scans that show that it could be potentially malicious? If we are still not sure, ThreatLocker now has a sandboxing feature where we can watch the application execute in a secure environment and see if it is doing anything potentially bad and if it is touching files that it should not be touching. By doing that, we have some more comfort. We know that the program we are allowing is safe.
We were able to see some of its benefits immediately and some were over time. We were using an EDR tool before ThreatLocker about six years ago. It was very noisy. A lot of alerts came up on that EDR. We were chasing a lot of ghosts, trying to figure out whether it was malicious or not. A lot of it was not malicious, but we still had to do all that checking. When we put ThreatLocker in place, one of the things that we immediately noticed was that it was blocking everything by default and only allowing things that we approved. It reduced the ticket noise. We mostly had things that needed investigation and more likely were malicious and needed to be reviewed. That was an immediate change. Over time, we got other benefits. We got a better grasp of what is being run on our clients' desktops. In the rare cases where because of the nature of their work, we allow them to have admin rights, we can still control what applications are being installed. Could they bypass it? Potentially and theoretically, yes, but that would be very difficult and require some technical skill. We at least have some verification of what applications are run and what applications are allowed. So, its long-term benefit was much more control over the clients' environments and the short-term or immediate benefit was a reduction in ticket noise that we were having to deal with chasing a lot of false positive alerts.
Allowlisting helped us reduce our organization’s help desk tickets. We were able to reduce our security alerts by 75% to 85% after its implementation, and now, it is practically down to zero. We have very few alerts that we need to chase at this point.
Allowlisting has technically helped us to free up help desk staff for other projects, but we have not quantified the savings. Because we are not having to do these other things, we are able to work on helping clients and get their work done better rather than just chasing security events.
Allowlisting has not helped us consolidate applications and tools because our usage is quite narrow. We are just using allowlisting, ringfencing, and a little bit of elevation. They have other products in their mix, but we already have other products that do some of those things. I do not see us necessarily replacing all of that with other parts of ThreatLocker, so there is no tool reduction. However, it fits nicely into our workflows. In other words, it integrates into our PSA. Tickets come in there, and from there, we can go directly to ThreatLocker and do approvals. We also have the pop-ups on the mobile device.
What is most valuable?
Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc. By doing that, we can also limit the exposure of those applications for the company. This encapsulates how we are trying to protect the clients. We can tell them the applications that they need to run and what they are allowed to do, and that is it.
What needs improvement?
It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA.
Additionally, having their Cyber Hero support available during non-working hours could improve service for clients. They have a managed version of allowlisting with Cyber Hero so that their Cyber Heroes can approve things. It would be nice if I could implement that during the hours we are not working so that clients who work during our night would have a better experience and do not have to wait till morning to get their applications approved.
For how long have I used the solution?
I started Triada Networks in 2008, which makes it 16 years. However, we started using ThreatLocker about six years ago.
What do I think about the stability of the solution?
We have had very few stability issues. Occasionally, the portal has become unresponsive, but the product itself continues to function without interruption. I do not remember the last time that happened. It was maybe about two years ago. They have fairly solidly developed this product.
What do I think about the scalability of the solution?
We have not encountered any scalability issues. I know colleagues with thousands of endpoints on ThreatLocker with no reported problems. I do not anticipate having scalability problems at all.
How are customer service and support?
To contact ThreatLocker, we go through their chat service. They have a live chat where they typically get somebody on in a minute or two. They always have somebody who is available and starts to work with us on any issues. We had to contact them more frequently when we were learning ThreatLocker Protect and ran into weird issues, but we do not contact them too often now just because we are managing it ourselves. Once in a while, we do get their support. They are very fast and helpful regardless of what time it is.
Their support is a ten out of ten. They are one of the best support teams that we run into product-wise. I do not give that rating lightly. Most of our vendors are in the six or seven range. ThreatLocker does an exceptional job when it comes to support.
How would you rate customer service and support?
Positive
How was the initial setup?
The management console is in the cloud, and the endpoint agent is on the device.
Its deployment was very easy. They provided installation scripts for Windows. We were easily able to put it into our RMM tool and deploy it to the devices of our clients. In fact, we do that today when we onboard a new client. As soon as our RMM agent is installed, one of the first things that gets installed in that stack is ThreatLocker, so we have it automated so that as soon as a client is onboarded or we install a new PC, ThreatLocker gets installed.
We deployed it client by client. We were onboarded very early. We would do one client a month and ramp that up until we got to month three, and then we deployed everything else. That was the process. In about three months, we were comfortable enough with the platform that we were able to manage it going forward on our own. After 90 days, we went to town and deployed the rest of our fleet. It was en masse at that point.
What about the implementation team?
The implementation was done in-house with support from ThreatLocker during onboarding. We had a couple of weekly or biweekly sessions to learn troubleshooting and approvals.
Of course, things have changed since then, so you learn those along the way. One good thing they do is that once a quarter, they do a check-in with their technical account manager. We go over any issues or things that we would like to bring up. They do a nice job of taking that information back to their development team or their product teams to make adjustments in the solution over time.
What's my experience with pricing, setup cost, and licensing?
Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools. We have a few tools that would fit into that category, but then there are some that are more expensive than they need to be. ThreatLocker is definitely not one of them.
It is one of the reasons why we have eliminated other tools, but ThreatLocker has not necessarily replaced them. It was because ThreatLocker and some of our other things were doing so much that we did not necessarily need them. We were able to remove that redundancy. So, its price is fair. Hopefully, they do not take this to raise their prices.
Which other solutions did I evaluate?
We looked at Microsoft AppLocker but found it difficult to manage and maintain. We also considered Airlock Digital and other security tools but found that they lacked the ability to manage at scale. That is what ThreatLocker does very well. We are a small team. We are managing 400 or so computers with a small staff, and we are still able to do that because the tools do a lot of the heavy lifting for us. If we had to do that with AppLocker, AirLock Digital, or any other security tools, it would have been a lot more time-consuming. We probably would have needed more staff to do that.
When we went with ThreatLocker, there were not a lot of allowlisting companies out there. Some of them were more enterprise and mid-market. The concept of ringfencing was not the one that the others were even talking about.
When we are at a conference or business meeting, a lot of times we do a hacker demo. Usually, the demo involves a Word document that downloads something malicious or runs something malicious that gives you backdoor access. Ringfencing is designed to prevent that from happening. When you have a Word document, Word does not need to execute other programs. Chrome does not need to execute other programs. Excel does not need to execute other programs. Excel does not need to beacon out and connect to the Internet. Locking these little avenues greatly diminishes your chances of getting compromised. Nothing is 100%, but controlling what each application can do can make everything work better.
What other advice do I have?
I would rate ThreatLocker Protect a ten out of ten. It is a great product. At times, it might block something, and we are not aware that it is being blocked and are trying to troubleshoot something. It is one of those things that we always have to remember. We bring up ThreatLocker and see if something is going on. In the past, we had to go to the portal, and there was a delay by the time that the agent would report to the portal for that information, but now, we have the ability to, at least on the device, see in real-time what is happening so that we can troubleshoot it and more. We just need to check this, but it is solid. It would probably be one of the last tools that we would remove if we ever remove anything.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Security Analyst at Wagamon Technlogy Group, LLC.
Ringfencing and elevation streamline administrative tasks and enhance workflow efficiency
Pros and Cons
- "I really enjoy ringfencing and elevation features. It makes my life easier because I do not have to get on a computer to elevate a prompt to allow users to run something they run every day as an admin."
- "Overall, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a ten out of ten."
- "I cannot suggest anything that they are not already doing. They should keep adding features as they have been."
What is our primary use case?
We use this solution for Zero Trust application installations, as well as ringfencing those applications and elevating administrative rights.
How has it helped my organization?
ThreatLocker Zero Trust Endpoint Protection Platform cuts down on ticket times for a couple of my employees. They are able to get tickets done faster. Elevation helps with that, and throwing a computer in learning mode is super easy for them, so it just works in their workflow.
They are able to get the work that they need to do faster because they are not being bogged down with needless tickets.
It has helped free up our IT team’s time for other projects or tasks. On average, it has saved about two hours a week of work time.
ThreatLocker Zero Trust Endpoint Protection Platform is not difficult. It is easy for IT teams to use. They just need to install an agent.
ThreatLocker Zero Trust Endpoint Protection Platform has not consolidated any of our tools. It has just added to our stack and helps us sleep at night.
ThreatLocker Zero Trust Endpoint Protection Platform has not saved us costs because purchasing the agents costs money, but it helps in generating revenue because it is another thing that we can add to contracts to help our clients be more secure. I do not do the finances for the company, but I know it produces revenue because we are keeping the product.
ThreatLocker Zero Trust Endpoint Protection Platform is great for blocking access to unauthorized applications. We test it for when we need it. We have never come across any issues. Cyber Heroes are great. They resolve many issues that we find in a matter of minutes.
What is most valuable?
I really enjoy ringfencing and elevation features. It makes my life easier because I do not have to get on a computer to elevate a prompt to allow users to run something they run every day as an admin.
What needs improvement?
They have a good foothold in the game right now. They are doing everything right, and as long as they keep improvising and adapting, they will continue to overcome. I cannot suggest anything that they are not already doing. They should keep adding features as they have been.
For how long have I used the solution?
We have used the solution for a little bit over a year.
What do I think about the stability of the solution?
It is excellent. They are constantly pushing out updates. They are always putting out webinars and keeping everyone informed. They are great.
What do I think about the scalability of the solution?
Scalability is easy. Their policies, the grouping of the policies, and the way the hierarchy works for all of their policies are excellent.
How are customer service and support?
The customer service is a ten out of ten. It cannot get better.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use any previous solutions.
How was the initial setup?
We have a hybrid environment. We are an MSP, and we have 40 different clients. We adopt the environment they come with. We use Microsoft Azure Cloud.
The setup was easy. It was just deploying the agent and letting it learn for 21 days. It then just goes, and you do not hear much from it after that. It is super simple. The only time you hear from it after that is when there is a new application or it is not a built-in.
What about the implementation team?
We have a technical representative from ThreatLocker who assists us.
What was our ROI?
It is the fact that I am sleeping at night. I know that my systems are secure. They are not going anywhere. Nothing is happening to them. Any policy I put in place is a policy that stays in place, and it knows it is going to protect my system.
What other advice do I have?
It is a great platform all around. It has great support. People developing it know what they are doing. They see a future. They see a path, and they are going down it. I like it. I like what I see.
Overall, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Buyer's Guide
Download our free ThreatLocker Zero Trust Platform Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Product Categories
Endpoint Protection Platform (EPP) Network Access Control (NAC) Advanced Threat Protection (ATP) Application Control ZTNA as a Service ZTNA Ransomware ProtectionPopular Comparisons
Fortinet FortiGate
CrowdStrike Falcon
Microsoft Defender for Endpoint
SentinelOne Singularity Complete
Microsoft Defender for Office 365
Cortex XDR by Palo Alto Networks
Cloudflare One
Varonis Platform
Cisco Identity Services Engine (ISE)
Zscaler Zero Trust Exchange Platform
Trellix Endpoint Security Platform
WatchGuard Firebox
Fortinet FortiClient
Cato SASE Cloud Platform
Buyer's Guide
Download our free ThreatLocker Zero Trust Platform Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?
- Are you aware of SIEM platforms that integrate both Active Directory auditing and security monitoring tools?
- What is the best solution for ransomware attack?
















