Error Title

This is a notice message, displayed at the top of the browser, informing the user of something useful.

or
Continue with LinkedIn
Recover my Password
Submit your Tekpon Account E-mail address and you will receive an email with instructions to reset your password.

ThreatLocker

Tekpon Score
9.3

ThreatLocker Reviews

& Product Details

What is ThreatLocker?

ThreatLocker is a cutting-edge Zero Trust Endpoint Protection Platform designed to safeguard businesses against zero-day attacks. With a default deny approach, it proactively prevents threats, including ransomware, by allowing only authorized applications to run.

By enforcing strict access controls and ringfencing applications, ThreatLocker reduces the attack surface and enhances cybersecurity compliance. Its unified cybersecurity controls empower organizations to regain control over their networks and eliminate the fear of cyberattacks.

Founded by experienced cybersecurity professionals, ThreatLocker offers a comprehensive suite of security tools that enable users to determine exactly what runs on their networks.

This innovative solution combines application control with ringfencing and storage policies, reinforcing a Zero Trust posture and thwarting attacks that exploit vulnerabilities.

Found in these Categories

Best For

Protection against the exploitation of zero-day vulnerabilities.
  • StartUps
  • Freelancers
  • Small Business
  • Medium Business
  • Large Enterprise
  • Non-profit Organization
  • Personal
  • Cloud, SaaS, Web-Based
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Company Name

    ThreatLocker

  • Located In

    United States

  • Website

    threatlocker.com

Starting from:

Custom

Pricing Model: Subscription

  • Free Trial
  • Free Version

Pricing Details:

ThreatLocker offers a free 30-day trial providing access to their entire cybersecurity platform, 24/7 U.S. based support, and seamless onboarding. Users can allow authorized applications, block untrusted software, and ensure compliance with various standards. The trial grants a comprehensive experience of its Endpoint Protection Platform, supported by their responsive Cyber Hero Team.

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Monitoring
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Audit Trail
  • Backup and Recovery
  • Configuration Management
  • Device Management
  • Endpoint Management
  • Firewalls
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Remote Monitoring & Management
  • Risk Alerts
  • Security Auditing
  • Server Monitoring
  • Third Party Integrations
  • Threat Response
  • Whitelisting/Blacklisting

Additional Features

  • Activity Dashboard
  • Activity Tracking
  • Alerts/Escalation
  • Behavioral Analytics
  • Customizable Reports
  • Data Security
  • Endpoint Protection
  • Event Logs
  • Real Time Analytics
  • Real Time Data
  • Event Tracking
  • HIPAA Compliant
  • Issue Management
  • Real Time Notifications
  • Real Time Reporting
  • Monitoring
  • PCI Compliance
  • Real Time Updates
  • Reporting & Statistics
  • Reporting/Analytics
  • Secure Login
  • Summary Reports
  • Workflow Management

Jamf

Tekpon Score
COMPARE

Sophos Intercept X

Tekpon Score
COMPARE

Heimdal

Tekpon Score
COMPARE
  • Splunk Enterprise

    Endpoint Protection Software

  • ConnectWise Control

    Remote Desktop Software

4.8
Global Average Score
Score4.80/5
Reviews138
  • Strong Customer Support

    Users have highlighted the excellent customer support provided by ThreatLocker.

  • Ease of Use

    The software is praised for its user-friendly interface and ease of use.

  • Effective Zero Trust Security

    It offers a comprehensive all-in-one zero-trust solution, including application control, privileged access management, and storage access control.

  • Automated Threat Detection and Response

    The platform’s automated capabilities are highly valued for enhancing security and reducing the risk of attacks and breaches.

  • Effective Whitelisting Process

    The software has a robust “deny all until approval” process, which has proven effective in stopping malware and unauthorized software.

  • Prebuilt Templates and Rules

    ThreatLocker provides many prebuilt templates for standard software, saving time in setup and configuration.

  • Interface and Reporting

    Some users have suggested improving the interface and reporting functionality for a better user experience.​

  • Not a "Set and Forget" Product

    Users noted that ThreatLocker requires ongoing management and is not a solution you can simply set up and ignore

  • Consistency with MS Store Downloads:

    There are concerns regarding the inconsistency in blocking or allowing downloads from the Microsoft Store.

  • Scalability and Mobile Interface

    While scalability is rated highly, there’s limited feedback on the effectiveness of the mobile interface

Disclaimer

Here at Tekpon's Global Buzz, we blend AI smarts with a human touch to offer a snapshot of user reviews from the web. While we carefully craft these summaries, please remember they reflect diverse user views and experiences, not Tekpon’s own opinions.

Tell us your opinion about ThreatLocker and help others.