Logo of ThreatLocker

ThreatLocker

Website LinkedIn Twitter

Last updated on

Company health

Employee growth
53% increase in the last year
Web traffic
10% decrease in the last quarter
Financing
January 2024 - $239M

Ratings

G2
4.8/5
(155)
Capterra
4.9/5
(64)
Glassdoor
3.3/5
(74)

ThreatLocker description

ThreatLocker is a cybersecurity software that helps businesses control which applications are allowed to run on their computer networks. It's like a strict security guard for your company's computers, blocking any unauthorized software from running, including ransomware. This helps prevent cyberattacks and keeps your company's data safe. ThreatLocker is known for its strong customer support and easy-to-use tools that simplify complex security measures.


Who is ThreatLocker best for

ThreatLocker is a cybersecurity solution ideal for businesses of all sizes, especially Managed Service Providers (MSPs). Users praise its robust application control, ransomware protection, and excellent customer support, particularly the "Cyber Heroes." Some users note a steeper learning curve and occasional false positives requiring rule adjustments. ThreatLocker excels at preventing unauthorized software and bolstering security posture.

  • Ideal for small, medium, and enterprise businesses seeking robust cybersecurity.

  • Best fit for Software, IT & Telecommunications companies.


ThreatLocker features

Type in the name of the feature or in your own words tell us what you need
Supported

ThreatLocker allows explicitly permitting or blocking specific applications.

Supported

ThreatLocker prevents ransomware by blocking untrusted applications.

Supported

ThreatLocker uses behavioral analysis and machine learning to detect suspicious activities.

Supported

ThreatLocker supports Network Access Control through features like dynamic ACLs and centralized management.

Qualities

We evaluate the sentiment that users express about non-functional aspects of the software

Value and Pricing Transparency

Rather positive
+0.53

Customer Service

Strongly positive
+0.98

Ease of Use

Strongly positive
+0.73

Reliability and Performance

Strongly positive
+0.91

Ease of Implementation

Rather positive
+0.48

Scalability

Strongly positive
+0.71

ThreatLocker reviews

We've summarised 219 ThreatLocker reviews (ThreatLocker Capterra reviews and ThreatLocker G2 reviews) and summarised the main points below.

Pros of ThreatLocker
  • Excellent customer support and responsiveness, particularly the "Cyber Heroes".
  • Robust application control and whitelisting capabilities.
  • Effective ringfencing to prevent malware spread.
  • Granular control over application permissions and network access.
  • Easy deployment and integration with RMM tools.
Cons of ThreatLocker
  • Limited Mac and Linux support.
  • Can be complex to set up and manage policies effectively.
  • Occasional false positives and the need for frequent rule adjustments.
  • Initial setup and learning curve can be challenging for some users.
  • Pricing may be high for larger networks.

ThreatLocker pricing

The commentary is based on 17 reviews from ThreatLocker Capterra reviews and ThreatLocker G2 reviews.

ThreatLocker's pricing is generally considered reasonable and worthwhile for the value it provides, especially for smaller businesses. Some users mention a complex pricing structure that can be initially difficult to understand, while others praise the accommodating price and not-for-profit discounts. However, concerns have been raised about scalability and cost for larger networks.

Users sentiment

Rather positive
+0.53

ThreatLocker alternatives

  • Logo of Trend Micro Apex One
    Trend Micro Apex One
    Better for organizations in healthcare, manufacturing, hospitality, government, marketing, and professional services. Has broader industry applicability but slower momentum. A ThreatLocker competitor focused on comprehensive endpoint security and threat detection.
    Read more
  • Logo of FortiClient
    FortiClient
    Better suited for organizations with remote workers needing secure access. Offers a free version and broader operating system compatibility. VPN speed and ease of use are frequently praised. Simpler initial setup, but adding users can be complex.
    Read more
  • Logo of CrowdStrike Falcon Endpoint Protection Platform
    CrowdStrike Falcon Endpoint Protection Platform
    Better suited for larger enterprises, particularly those with cloud workloads. Higher rated by users but more expensive with a steeper learning curve. Lacks granular application control.
    Read more
  • Logo of Kaseya VSA
    Kaseya VSA
    Better suited for organizations needing broader IT management capabilities beyond application control. More versatile across various industries, especially healthcare, finance, and education. Offers stronger user ratings and perceived ease of use. However, community sentiment around pricing is less favorable. A strong Kaseya VSA alternative for IT departments and MSPs.
    Read more
  • Logo of N-able N-Sight RMM
    N-able N-Sight RMM
    Better for IT departments and MSPs managing SMEs. A ThreatLocker competitor, it offers broader platform support, including Mac and Linux. Easier to use with better customer service, based on user reviews.
    Read more
  • Logo of Intezer
    Intezer
    Better for malware analysis and threat hunting. Geared towards medium to large businesses. Has more momentum. Easier to implement.
    Read more

ThreatLocker FAQ

  • What is ThreatLocker and what does ThreatLocker do?

    ThreatLocker is a cybersecurity platform that uses application control to block unknown software, preventing ransomware and other malware. It's praised for robust protection and excellent support, simplifying complex security for businesses of all sizes, especially managed service providers.

  • How does ThreatLocker integrate with other tools?

    ThreatLocker integrates with RMM tools for simplified deployment and management. It also supports Network Access Control through dynamic ACLs and centralized management features, enhancing its integration capabilities for comprehensive security.

  • What the main competitors of ThreatLocker?

    Top alternatives to ThreatLocker include CrowdStrike Falcon, known for its AI-driven threat detection, and FortiClient, trusted by large organizations for comprehensive endpoint security. Intezer offers automated threat analysis and Symantec Endpoint Security provides robust protection against various cyber threats. Action1 focuses on patch management and vulnerability remediation.

  • Is ThreatLocker legit?

    ThreatLocker is a legitimate and safe cybersecurity solution. It effectively prevents ransomware and other threats through application control, earning positive reviews for its robust security and excellent customer support. However, potential users should be aware of the initial setup complexity and potential for false positives.

  • How much does ThreatLocker cost?

    ThreatLocker does not publicly disclose pricing information. Contact their sales team for a quote based on your specific business needs and to determine if ThreatLocker is worth the investment for you.

  • Is ThreatLocker customer service good?

    ThreatLocker's customer service is highly regarded. Users consistently praise the knowledgeable and responsive support team, often referred to as "Cyber Heroes," for their quick resolutions and helpful guidance. Support is readily available via chat and Zoom calls.


Reviewed by

MK
Michal Kaczor
CEO at Gralio

Michal has worked at startups for many years and writes about topics relating to software selection and IT management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs of any business and find solutions to its problems.

TT
Tymon Terlikiewicz
CTO at Gralio

Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX, HR, Payroll, Marketing automation and various developer tools.