MENU
GET LISTED
GET LISTED
SHOW ALLPOPULAR CATEGORIES

ThreatLocker Review

ThreatLocker
Our score: 8.1 User satisfaction: 97%

What is ThreatLocker?

ThreatLocker is a cybersecurity platform that allows organizations, businesses, MSPs and MSSPs, and IT team to protect their environments from known and unknown threats, vulnerabilities, and attacks at the endpoint. It provides easy-to-use, complete, enterprise-grade solutions for accessing applications, storage devices, and networks with a zero-trust posture.

You can control which applications should run on your networks, servers, and endpoints and whether or not each approved application can access and interact with files, data, and other applications. ThreatLocker simplifies granting or denying local admin rights and privileges to specific users and applications. Access to USBs, local disks, and shared network drives and the files and data they contain can also be managed and monitored.

The cybersecurity platform also enables you to secure your servers and endpoints from traffic going in and out of private and public networks through IP filtering, authentication keywords, and access control lists. Additionally, ThreatLocker can be integrated with PSA and RMM platforms, including SolarWinds, Kaseya, ConnectWise, and Datto.

Show More

Overview of ThreatLocker Benefits

Application Allowlisting & Control

ThreatLocker’s Allowlisting solves the historical whitelisting challenges of building allowed application lists, responding to updates, and adding new applications. When deployed in Learning Mode, ThreatLocker discovers and logs all applications and their dependencies, including executables, libraries, and scripts, that are currently existing or running on your environment. Based on real-time information and recommendations from your dedicated Solutions Engineer during this onboarding, You and your IT administrator can create allowlisting policies by hash that indicate the applications and dependencies permitted to run on your secured servers and endpoints. To handle constant application updates, ThreatLocker’s 24/7 team monitors and works with applications vendors to apply updated hashes for over 2000 common applications. So when one or more application updates are applied, the updated hash is already part of the control policy. 

When new applications are needed, users or admins can request them, and admins receive access to a testing environment to test the requested application in a sandboxed VDI and evaluate the risk in seconds to allow for approval or decline decisions quickly.

Ringfencing™

ThreatLocker’s Ringfencing™ solution controls what applications are able to do once they are running. By limiting how software can interact on your devices, ThreatLocker can reduce the likelihood of an exploit of unknown application vulnerabilities from being successful as well as if an attacker weaponizes your trusted applications with malware to copy or encrypt files, change registry keys, or access network resources. With Ringfencing™, you can reduce your company’s or client’s exposure to fileless malware, ransomware, island hopping, and zero-day attacks.

Storage Control & Network Access Control

Threatlocker’s cybersecurity platform provides you with complete and unified visibility and control over storage devices and networks. Access to USB devices, local hard drives, and shared network folders can be allowed, denied, or restricted depending on time, user, file type, and application. Using a centralized digital audit trail, you can track and review all the activities of users on storage devices and the specific file names and data they accessed, copied, and transferred.

ThreatLocker comes with Network Access Control that guards your servers and endpoints against internal and external network threats and vulnerabilities. Instead of having your servers available to the public, you’ll permit or prevent devices on your local network or the internet from connecting to your servers and endpoints based on location, IP address, port, or keyword.

Employee Productivity with Elevation Control

With ThreatLocker, you can enhance security and maintain compliance without compromising the productivity of your employees. You can temporarily or permanently elevate user privileges for specific applications so that employees can run those apps as a local admin without gaining full admin rights. Your employees can access and use all of the critical tools and data they need to quickly and smoothly perform their tasks. They don’t have to keep requesting admin rights from IT. This also prevents unauthorized access by users or for a user’s access to be weaponized

Show More

Overview of ThreatLocker Features

  • Application Whitelisting / Allowlisting
  • Learning Mode
  • Virtual Testing Environment
  • Application Control
  • Ringfencing™
  • Elevation Control
  • Storage Access Management
  • Centralized Audit Trail
  • Network Security

Awards & Quality Certificates

An award given to products our B2B experts find especially valuable for companies

ThreatLocker Position In Our Categories

Since businesses have distinctive business wants, it is only reasonable that they abstain from settling on an all-in-one, “perfect” business program. At any rate, it would be hard to stumble on such a software solution even among sought-after software solutions. The reasonable thing to undertake would be to note down the several essential factors which entail analysis including critical features, pricing, technical skill levels of staff members, business size, etc. After which, you should follow through the research systematically. Go over some of these ThreatLocker reviews and look over the other solutions in your shortlist more closely. Such comprehensive product investigation guarantee you steer clear of mismatched software solutions and pay for the system that offers all the aspects your business requires.

Position of ThreatLocker in our main categories:

It's crucial to realize that virtually no service in the IT Security Software category is going to be a perfect solution able to match all the requirements of all company types, sizes and industries. It may be a good idea to read a few ThreatLocker IT Security Software reviews first as certain solutions may dominate only in a really narrow group of applications or be prepared with a very specific type of industry in mind. Others can work with an intention of being easy and intuitive and as a result lack complicated functions welcomed by more experienced users. There are also software that support a wide group of customers and give you a rich feature base, but this usually comes at a higher cost of such a solution. Make sure you're aware of your needs so that you buy a service that offers exactly the functionalities you look for.

How Much Does ThreatLocker Cost?

ThreatLocker Pricing Plans:

Free Trial

Quote-based Plan

Contact vendor

Show More

What are ThreatLocker pricing details?

ThreatLocker Pricing Plans:

Free Trial

Quote-based Plan

Contact vendor

ThreatLocker offers a free trial. Enterprise pricing is quote-based priced by endpoint and based on volume. Enterprise pricing information is available only upon request.

User Satisfaction

Positive Social Media Mentions 10
Negative Social Media Mentions 0

We are aware that when you make a decision to get a IT Security Software it’s vital not only to find out how professionals rank it in their reviews, but also to check whether the actual people and enterprises that purchased this software are indeed happy with the product. Because of that need we’ve designer our behavior-based Customer Satisfaction Algorithm™ that aggregates customer reviews, comments and ThreatLocker reviews across a broad array of social media sites. The data is then presented in an easy to understand form showing how many clients had positive and negative experience with ThreatLocker. With that information available you will be ready to make an informed business choice that you won’t regret.

Video

Technical details

Devices Supported

  • Windows
  • Mac
  • Web-based

Deployment

  • Cloud Hosted

Language Support

  • English

Pricing Model

  • Quote-based

Customer Types

  • Small Business
  • Large Enterprises
  • Medium Business

What Support Does This Vendor Offer?

  • email
  • phone
  • live support
  • training
  • tickets

What integrations are available for ThreatLocker?

ThreatLocker integrates with the following RMM and PSA platforms:

  • SolarWinds
  • Datto
  • ConnectWise
  • Datto
Note

ThreatLocker
is waiting for
your first review.

Arrow

Write your own review of this product

ADD A REVIEW

More reviews from 0 actual users:

women man women man man women

Join a community of 7,369 SaaS experts

Thank you for the time you take to leave a quick review of this software. Our community and review base is constantly developing because of experts like you, who are willing to share their experience and knowledge with others to help them make more informed buying decisions.

Sign in with LinkedIn Why we require LinkedIn?
  • Show the community that you're an actual user.
  • We will only show your name and profile image in your review.
  • You can still post your review anonymously.

OR

Sign in with company email

Sign in with company email

Popular ThreatLocker Alternatives

Top Competitors To ThreatLocker By Price

Trending IT Security Software Reviews

ThreatLocker Comparisons

Nestor Gilbert

By Nestor Gilbert

Nestor Gilbert is a senior B2B and SaaS analyst and a core contributor at FinancesOnline for over 5 years. With his experience in software development and extensive knowledge of SaaS management, he writes mostly about emerging B2B technologies and their impact on the current business landscape. However, he also provides in-depth reviews on a wide range of software solutions to help businesses find suitable options for them. Through his work, he aims to help companies develop a more tech-forward approach to their operations and overcome their SaaS-related challenges.

Page last modified
Did you find this review useful?
Yes No

Thank you for your feedback

How can we make this page better?

Unsure about this software?
FIND ALTERNATIVES
TOP

Why is FinancesOnline free? Why is FinancesOnline free?

FinancesOnline is available for free for all business professionals interested in an efficient way to find top-notch SaaS solutions. We are able to keep our service free of charge thanks to cooperation with some of the vendors, who are willing to pay us for traffic and sales opportunities provided by our website. Please note, that FinancesOnline lists all vendors, we’re not limited only to the ones that pay us, and all software providers have an equal opportunity to get featured in our rankings and comparisons, win awards, gather user reviews, all in our effort to give you reliable advice that will enable you to make well-informed purchase decisions.

Share
Tweet
Share