Continue with LinkedIn
or
Recover my Password
Submit your Tekpon Account E-mail address and you will receive an email with instructions to reset your password.

ThreatLocker Reviews for 2025

Protection against the exploitation of zero-day vulnerabilities.
User Score:
4.8/5

Score is based on User Sentiment from reviews and public chatter. We weight volume, recency, and consistency, then normalize to 5.

See our Methodology.
Need help with procurement?

Save 40% on your SaaS stack with expert guidance

You tell us what you need. We deliver the right tools at the best price. Fast. Independent. Hassle-free.

Your Credentials

Tell us who you are

Your Business

Tell us about your Company

Tell Us Your Software Needs

Share your requirements and let our procurement experts help you find the best software deals, negotiate renewals, or compare alternatives — tailored to your business goals.

Please, wait!

Processing

Step
1 / 3
Back
Next Step

Disclaimer

By submitting this form, you agree to be contacted by the Tekpon Team and our Partners.

*Required fields!

Free Consultation

What is ThreatLocker?

ThreatLocker is a cutting-edge Zero Trust Endpoint Protection Platform designed to safeguard businesses against zero-day attacks. With a default deny approach, it proactively prevents threats, including ransomware, by allowing only authorized applications to run.

By enforcing strict access controls and ringfencing applications, ThreatLocker reduces the attack surface and enhances cybersecurity compliance. Its unified cybersecurity controls empower organizations to regain control over their networks and eliminate the fear of cyberattacks.

Founded by experienced cybersecurity professionals, ThreatLocker offers a comprehensive suite of security tools that enable users to determine exactly what runs on their networks.

This innovative solution combines application control with ringfencing and storage policies, reinforcing a Zero Trust posture and thwarting attacks that exploit vulnerabilities.

Found in these Categories

Best For

  • StartUps
  • Freelancers
  • Small Business
  • Medium Business
  • Large Enterprise
  • Non-profit Organization

ThreatLocker Pricing

Starting From: Custom
Pricing Model: Subscription
ThreatLocker offers a free 30-day trial providing access to their entire cybersecurity platform, 24/7 U.S. based support, and seamless onboarding. Users can allow authorized applications, block untrusted software, and ensure compliance with various standards. The trial grants a comprehensive experience of its Endpoint Protection Platform, supported by their responsive Cyber Hero Team.
Free Trial
Free Version

Looking to Save Time & Money

Audit, consolidate, and save—powered by our internal buying team. Let our experts analyze your current software stack and identify opportunities for cost savings and efficiency improvements.

  • Stack Audit
  • Cost Reduction
  • Expert Team
Optimize My Stack

ThreatLocker Features

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Monitoring
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Audit Trail
  • Backup and Recovery
  • Configuration Management
  • Device Management
  • Endpoint Management
  • Firewalls
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Remote Monitoring & Management
  • Risk Alerts
  • Security Auditing
  • Server Monitoring
  • Third Party Integrations
  • Threat Response
  • Whitelisting/Blacklisting
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Escalation
  • Behavioral Analytics
  • Customizable Reports
  • Data Security
  • Endpoint Protection
  • Event Logs
  • Real Time Analytics
  • Real Time Data
  • Event Tracking
  • HIPAA Compliant
  • Issue Management
  • Real Time Notifications
  • Real Time Reporting
  • Monitoring
  • PCI Compliance
  • Real Time Updates
  • Reporting & Statistics
  • Reporting/Analytics
  • Secure Login
  • Summary Reports
  • Workflow Management

User Sentiment - ThreatLocker Reviews

4.8/5
Based on 138 user reviews across the web
AI-powered Insight: This summary represents a comprehensive analysis of user reviews and opinions found across the web, including G2, Capterra, TrustPilot, and other review platforms. Our AI aggregates sentiment and identifies key themes from verified user feedback.
What users love most
  • Strong Customer Support

    Users have highlighted the excellent customer support provided by ThreatLocker.

  • Ease of Use

    The software is praised for its user-friendly interface and ease of use.

  • Effective Zero Trust Security

    It offers a comprehensive all-in-one zero-trust solution, including application control, privileged access management, and storage access control.

  • Automated Threat Detection and Response

    The platform’s automated capabilities are highly valued for enhancing security and reducing the risk of attacks and breaches.

  • Effective Whitelisting Process

    The software has a robust “deny all until approval” process, which has proven effective in stopping malware and unauthorized software.

  • Prebuilt Templates and Rules

    ThreatLocker provides many prebuilt templates for standard software, saving time in setup and configuration.

Areas for Improvement
  • Interface and Reporting

    Some users have suggested improving the interface and reporting functionality for a better user experience.​

  • Not a "Set and Forget" Product

    Users noted that ThreatLocker requires ongoing management and is not a solution you can simply set up and ignore

  • Consistency with MS Store Downloads:

    There are concerns regarding the inconsistency in blocking or allowing downloads from the Microsoft Store.

  • Scalability and Mobile Interface

    While scalability is rated highly, there’s limited feedback on the effectiveness of the mobile interface

Leave a Review

Tell us your opinion about ThreatLocker and help others make informed decisions.
Account creation required to leave a review.

ThreatLocker Company Details

Company Name

ThreatLocker

Headquarters

United States

Website

threatlocker.com

Own this Software?

ThreatLocker vs. Similar Products

Select up to 3 Software, to enable Comparison

Compare Selected Software

ThreatLocker Alternatives

Get Better Pricing on ThreatLocker

Save 15-40% with expert negociation

Your Credentials

Tell us who you are

Your Business

Tell us about your Company

Tell Us Your Software Needs

Share your requirements and let our procurement experts help you find the best software deals, negotiate renewals, or compare alternatives — tailored to your business goals.

Please, wait!

Processing

Step
1 / 3
Back
Next Step

Disclaimer

By submitting this form, you agree to be contacted by the Tekpon Team and our Partners.

*Required fields!

Please, wait...

We are processing your request.

This website uses cookies

Cookies are small text files that can be used by websites to make a user’s experience more efficient.

The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This means that cookies which are categorized as necessary, are processed based on GDPR Art. 6 (1) (f). All other cookies, meaning those from the categories preferences and marketing, are processed based on GDPR Art. 6 (1) (a) GDPR.

You can at any time change or withdraw your consent from the Cookie Declaration on our website.

You can read more about all this at the following links.

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

These trackers help us to measure traffic and analyze your behavior to improve our service.

These trackers help us to deliver personalized ads or marketing content to you, and to measure their performance.