ThreatLocker Reviews for 2025
Save 40% on your SaaS stack with expert guidance
Free Consultation
What is ThreatLocker?
ThreatLocker is a cutting-edge Zero Trust Endpoint Protection Platform designed to safeguard businesses against zero-day attacks. With a default deny approach, it proactively prevents threats, including ransomware, by allowing only authorized applications to run.
By enforcing strict access controls and ringfencing applications, ThreatLocker reduces the attack surface and enhances cybersecurity compliance. Its unified cybersecurity controls empower organizations to regain control over their networks and eliminate the fear of cyberattacks.
Founded by experienced cybersecurity professionals, ThreatLocker offers a comprehensive suite of security tools that enable users to determine exactly what runs on their networks.
This innovative solution combines application control with ringfencing and storage policies, reinforcing a Zero Trust posture and thwarting attacks that exploit vulnerabilities.
Found in these Categories
Best For
- StartUps
- Freelancers
- Small Business
- Medium Business
- Large Enterprise
- Non-profit Organization
ThreatLocker Pricing
Looking to Save Time & Money
Audit, consolidate, and save—powered by our internal buying team. Let our experts analyze your current software stack and identify opportunities for cost savings and efficiency improvements.
- Stack Audit
- Cost Reduction
- Expert Team
ThreatLocker Features
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Monitoring
- Alerts/Notifications
- Anomaly/Malware Detection
- Audit Trail
- Backup and Recovery
- Configuration Management
- Device Management
- Endpoint Management
- Firewalls
- Patch Management
- Policy Management
- Real Time Monitoring
- Remote Monitoring & Management
- Risk Alerts
- Security Auditing
- Server Monitoring
- Third Party Integrations
- Threat Response
- Whitelisting/Blacklisting
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Behavioral Analytics
- Customizable Reports
- Data Security
- Endpoint Protection
- Event Logs
- Real Time Analytics
- Real Time Data
- Event Tracking
- HIPAA Compliant
- Issue Management
- Real Time Notifications
- Real Time Reporting
- Monitoring
- PCI Compliance
- Real Time Updates
- Reporting & Statistics
- Reporting/Analytics
- Secure Login
- Summary Reports
- Workflow Management
User Sentiment - ThreatLocker Reviews
-
Strong Customer Support
Users have highlighted the excellent customer support provided by ThreatLocker.
-
Ease of Use
The software is praised for its user-friendly interface and ease of use.
-
Effective Zero Trust Security
It offers a comprehensive all-in-one zero-trust solution, including application control, privileged access management, and storage access control.
-
Automated Threat Detection and Response
The platform’s automated capabilities are highly valued for enhancing security and reducing the risk of attacks and breaches.
-
Effective Whitelisting Process
The software has a robust “deny all until approval” process, which has proven effective in stopping malware and unauthorized software.
-
Prebuilt Templates and Rules
ThreatLocker provides many prebuilt templates for standard software, saving time in setup and configuration.
-
Interface and Reporting
Some users have suggested improving the interface and reporting functionality for a better user experience.
-
Not a "Set and Forget" Product
Users noted that ThreatLocker requires ongoing management and is not a solution you can simply set up and ignore
-
Consistency with MS Store Downloads:
There are concerns regarding the inconsistency in blocking or allowing downloads from the Microsoft Store.
-
Scalability and Mobile Interface
While scalability is rated highly, there’s limited feedback on the effectiveness of the mobile interface
Leave a Review
ThreatLocker Company Details
Company Name
ThreatLocker
Headquarters
United States
Website
threatlocker.com
Own this Software?
ThreatLocker vs. Similar Products
Select up to 3 Software, to enable Comparison
Compare Selected Software