or
Continue with LinkedIn
Recover my Password
Submit your Tekpon Account E-mail address and you will receive an email with instructions to reset your password.

ThreatLocker

Tekpon Score
9.3

ThreatLocker Reviews

& Product Details

What is ThreatLocker?

ThreatLocker is a cutting-edge Zero Trust Endpoint Protection Platform designed to safeguard businesses against zero-day attacks. With a default deny approach, it proactively prevents threats, including ransomware, by allowing only authorized applications to run.

By enforcing strict access controls and ringfencing applications, ThreatLocker reduces the attack surface and enhances cybersecurity compliance. Its unified cybersecurity controls empower organizations to regain control over their networks and eliminate the fear of cyberattacks.

Founded by experienced cybersecurity professionals, ThreatLocker offers a comprehensive suite of security tools that enable users to determine exactly what runs on their networks.

This innovative solution combines application control with ringfencing and storage policies, reinforcing a Zero Trust posture and thwarting attacks that exploit vulnerabilities.

Best For

Protection against the exploitation of zero-day vulnerabilities.
  • StartUps
  • Freelancers
  • Small Business
  • Medium Business
  • Large Enterprise
  • Non-profit Organization
  • Personal
  • Cloud, SaaS, Web-Based
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Company Name

    ThreatLocker

  • Located In

    United States

  • Website

    threatlocker.com

Starting from:

Custom

Pricing Model: Subscription

  • Free Trial
  • Free Version

Pricing Details:

ThreatLocker offers a free 30-day trial providing access to their entire cybersecurity platform, 24/7 U.S. based support, and seamless onboarding. Users can allow authorized applications, block untrusted software, and ensure compliance with various standards. The trial grants a comprehensive experience of its Endpoint Protection Platform, supported by their responsive Cyber Hero Team.

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Monitoring
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Audit Trail
  • Backup and Recovery
  • Configuration Management
  • Device Management
  • Endpoint Management
  • Firewalls
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Remote Monitoring & Management
  • Risk Alerts
  • Security Auditing
  • Server Monitoring
  • Third Party Integrations
  • Threat Response
  • Whitelisting/Blacklisting

Additional Features

  • Activity Dashboard
  • Activity Tracking
  • Alerts/Escalation
  • Behavioral Analytics
  • Customizable Reports
  • Data Security
  • Endpoint Protection
  • Event Logs
  • Real Time Analytics
  • Real Time Data
  • Event Tracking
  • HIPAA Compliant
  • Issue Management
  • Real Time Notifications
  • Real Time Reporting
  • Monitoring
  • PCI Compliance
  • Real Time Updates
  • Reporting & Statistics
  • Reporting/Analytics
  • Secure Login
  • Summary Reports
  • Workflow Management
4.8
Global Average Score
Score4.80/5
Reviews138
  • Strong Customer Support

    Users have highlighted the excellent customer support provided by ThreatLocker.

  • Ease of Use

    The software is praised for its user-friendly interface and ease of use.

  • Effective Zero Trust Security

    It offers a comprehensive all-in-one zero-trust solution, including application control, privileged access management, and storage access control.

  • Automated Threat Detection and Response

    The platform’s automated capabilities are highly valued for enhancing security and reducing the risk of attacks and breaches.

  • Effective Whitelisting Process

    The software has a robust “deny all until approval” process, which has proven effective in stopping malware and unauthorized software.

  • Prebuilt Templates and Rules

    ThreatLocker provides many prebuilt templates for standard software, saving time in setup and configuration.

  • Interface and Reporting

    Some users have suggested improving the interface and reporting functionality for a better user experience.​

  • Not a "Set and Forget" Product

    Users noted that ThreatLocker requires ongoing management and is not a solution you can simply set up and ignore

  • Consistency with MS Store Downloads:

    There are concerns regarding the inconsistency in blocking or allowing downloads from the Microsoft Store.

  • Scalability and Mobile Interface

    While scalability is rated highly, there’s limited feedback on the effectiveness of the mobile interface

Disclaimer

Here at Tekpon's Global Buzz, we blend AI smarts with a human touch to offer a snapshot of user reviews from the web. While we carefully craft these summaries, please remember they reflect diverse user views and experiences, not Tekpon’s own opinions.

  • Splunk Enterprise

    Endpoint Protection Software

  • ConnectWise Control

    Remote Desktop Software

Jamf

Tekpon Score
COMPARE

Sophos Intercept X

Tekpon Score
COMPARE

Heimdal

Tekpon Score
COMPARE

Tell us your opinion about ThreatLocker and help others.

Splunk Enterprise

Tekpon Score

PC Matic

Tekpon Score

FortiClient

Tekpon Score

Perimeter 81

Tekpon Score

NinjaOne

Tekpon Score

Kandji

Tekpon Score

Automox

Tekpon Score

Safetica

Tekpon Score

Defendify

Tekpon Score

INLYSE

Tekpon Score

Netwrix Auditor

Tekpon Score

Hexnode UEM

Tekpon Score

Uptycs

Tekpon Score

This website uses cookies

Cookies are small text files that can be used by websites to make a user’s experience more efficient.

The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This means that cookies which are categorized as necessary, are processed based on GDPR Art. 6 (1) (f). All other cookies, meaning those from the categories preferences and marketing, are processed based on GDPR Art. 6 (1) (a) GDPR.

You can at any time change or withdraw your consent from the Cookie Declaration on our website.

You can read more about all this at the following links.

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

These trackers help us to measure traffic and analyze your behavior to improve our service.

These trackers help us to deliver personalized ads or marketing content to you, and to measure their performance.