ThreatLocker Reviews
& Product DetailsWhat is ThreatLocker?
ThreatLocker is a cutting-edge Zero Trust Endpoint Protection Platform designed to safeguard businesses against zero-day attacks. With a default deny approach, it proactively prevents threats, including ransomware, by allowing only authorized applications to run.
By enforcing strict access controls and ringfencing applications, ThreatLocker reduces the attack surface and enhances cybersecurity compliance. Its unified cybersecurity controls empower organizations to regain control over their networks and eliminate the fear of cyberattacks.
Founded by experienced cybersecurity professionals, ThreatLocker offers a comprehensive suite of security tools that enable users to determine exactly what runs on their networks.
This innovative solution combines application control with ringfencing and storage policies, reinforcing a Zero Trust posture and thwarting attacks that exploit vulnerabilities.
Best For
- StartUps
- Freelancers
- Small Business
- Medium Business
- Large Enterprise
- Non-profit Organization
- Personal
- Cloud, SaaS, Web-Based
- Mobile - Android
- Mobile - iPhone
- Mobile - iPad
- Desktop - Mac
- Desktop - Windows
- Desktop - Linux
- Desktop - Chromebook
- On-Premise - Windows
- On-Premise - Linux
-
Company Name
ThreatLocker
-
Located In
United States
-
Website
threatlocker.com
Starting from:
Custom
Pricing Model: Subscription
- Free Trial
- Free Version
Pricing Details:
ThreatLocker offers a free 30-day trial providing access to their entire cybersecurity platform, 24/7 U.S. based support, and seamless onboarding. Users can allow authorized applications, block untrusted software, and ensure compliance with various standards. The trial grants a comprehensive experience of its Endpoint Protection Platform, supported by their responsive Cyber Hero Team.
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Monitoring
- Alerts/Notifications
- Anomaly/Malware Detection
- Audit Trail
- Backup and Recovery
- Configuration Management
- Device Management
- Endpoint Management
- Firewalls
- Patch Management
- Policy Management
- Real Time Monitoring
- Remote Monitoring & Management
- Risk Alerts
- Security Auditing
- Server Monitoring
- Third Party Integrations
- Threat Response
- Whitelisting/Blacklisting
Additional Features
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Behavioral Analytics
- Customizable Reports
- Data Security
- Endpoint Protection
- Event Logs
- Real Time Analytics
- Real Time Data
- Event Tracking
- HIPAA Compliant
- Issue Management
- Real Time Notifications
- Real Time Reporting
- Monitoring
- PCI Compliance
- Real Time Updates
- Reporting & Statistics
- Reporting/Analytics
- Secure Login
- Summary Reports
- Workflow Management
-
Strong Customer Support
Users have highlighted the excellent customer support provided by ThreatLocker.
-
Ease of Use
The software is praised for its user-friendly interface and ease of use.
-
Effective Zero Trust Security
It offers a comprehensive all-in-one zero-trust solution, including application control, privileged access management, and storage access control.
-
Automated Threat Detection and Response
The platform’s automated capabilities are highly valued for enhancing security and reducing the risk of attacks and breaches.
-
Effective Whitelisting Process
The software has a robust “deny all until approval” process, which has proven effective in stopping malware and unauthorized software.
-
Prebuilt Templates and Rules
ThreatLocker provides many prebuilt templates for standard software, saving time in setup and configuration.
-
Interface and Reporting
Some users have suggested improving the interface and reporting functionality for a better user experience.
-
Not a "Set and Forget" Product
Users noted that ThreatLocker requires ongoing management and is not a solution you can simply set up and ignore
-
Consistency with MS Store Downloads:
There are concerns regarding the inconsistency in blocking or allowing downloads from the Microsoft Store.
-
Scalability and Mobile Interface
While scalability is rated highly, there’s limited feedback on the effectiveness of the mobile interface
Disclaimer
Here at Tekpon's Global Buzz, we blend AI smarts with a human touch to offer a snapshot of user reviews from the web. While we carefully craft these summaries, please remember they reflect diverse user views and experiences, not Tekpon’s own opinions.
-
Splunk Enterprise
Endpoint Protection Software
-
ConnectWise Control
Remote Desktop Software
Tell us your opinion about ThreatLocker and help others.