Last Updated
Overview
ThreatLocker software provides powerful application control and endpoint security, enabling businesses to manage which applications can run on their systems. Although the setup process can be challenging for smaller teams, the granular control it offers makes it an excellent choice for organizations committed to robust network security.
Overall Rating
Based on 49 users reviews
4.9
Rating Distribution
Positive
100%
Neutral
0%
Negative
0%
Starting Price
Custom
ThreatLocker Specifications
- Security Measure
- Firewall Protection
- Anti-Virus and Anti-Malware
- Data Encryption
What Is ThreatLocker?
Overview
ThreatLocker is a cloud-based cyber security solution designed for businesses of all sizes, particularly in industries with stringent security requirements like healthcare and government. It offers application whitelisting, ring-fencing, and storage control to help organizations protect against ransomware, malware, and unauthorized access. What does ThreatLocker do? By permitting only approved applications to run, it significantly reduces the risk of breaches and data loss, effectively addressing challenges like unauthorized software use and endpoint vulnerabilities.
ThreatLocker Pricing
ThreatLocker Integrations
Who Is ThreatLocker For?
The software is designed for businesses of all sizes across various industries, including:
- Financial services
- MSP/MSSP
- Healthcare
- Education
- Government
Is ThreatLocker Right For You
As a leading solution in the cybersecurity space, ThreatLocker empowers organizations to maintain a secure and compliant environment. What ThreatLocker is used for is to protect against vulnerabilities. It is scalable and compliant with NIST, PCI DSS, and ZITNA standards.
Still not sure if ThreatLocker is right for you? Get in touch with our customer support team at (661) 384-7070, and it will help you make the best decision.
ThreatLocker Features
Allowlisting
ThreatLocker ensures that only pre-approved applications and files can run on your system, blocking all others by default. This reduces the risk of malware and unauthorized software, providing an additional layer of security and control.
Ringfencing
This feature restricts the interactions between applications, limiting what each can access or modify. This containment strategy prevents malicious activities from spreading, thereby enhancing security by isolating potential threats within your network.
Network Control
Network Control enables you to manage and restrict network access at the application level. By controlling which applications can communicate over the network, it mitigates the risk of data exfiltration and unauthorized access, bolstering overall network security.
Cyber Hero
The Cyber Hero program provides real-time support and guidance from cybersecurity experts, helping businesses implement and manage their security policies effectively. This personalized support ensures optimal configuration and reduces the burden on in-house IT teams.
ThreatLocker Direct
ThreatLocker Direct offers direct-to-cloud protection, bypassing traditional network layers for faster, more efficient security management. It enables businesses to enforce policies and monitor activities from the cloud, streamlining operations and enhancing response times in threat scenarios.
Pros And Cons of ThreatLocker
Pros
Mobile app
Extensive customization options
User-friendly management interface available
Excellent customer support
Cons
Limited third-party integrations available
Initial workload of onboarding software
Advanced features may overwhelm users
ThreatLocker Reviews
Total 49 reviews
4.9
All reviews are from verified customers
Rating Distribution
5
Stars92%
4
Stars8%
3
Stars0%
2
Stars0%
1
Stars0%
Share your experience
IT, 11-50 employees
More than a year
“Skycomp Solutions trusts ThreatLocker”
Pros
We've been using ThreatLocker for quite sometime now and it's really dependable. It detected many threats and kept us safe from many cyber attacks.
Cons
ThreatLocker tends to be a bit too sensitive when I download stuff from the web even from trusted sites. I often have to submit a ticket and wait for approval which can slow me down at times. But when I see the stats the extra effort seems worth it.
Rating Distribution
Ease of use
10
Value for money
10
Customer Support
10
Functionality
10
Mining & Metals, 500+ employees
Less than a year
“Threatlocker Zero Trust”
Pros
Application whitelisting was quite simple for most of our installation. ThreatLocker automatically learned all our applications and manages updates without our intervention. When custom rules are necessary, the user interface guides me through the process and alerts administrators if policies are insecure or too broad. Network control provides an easy way to implement network microsegmentation and the audit tools simplify determining port communications between hosts. The ThreatLocker Administrator Password System in the configuration manager allowed us to retire our Microsoft Local Administrator Password Solution. Setup took less than five minutes with no complex Group Policy Objects or additional programs. Support is immediate and knowledgeable, with very small wait times for help any time of day via chat.
Cons
The Network control feature tends to encounter issues when using Threatlocker specific objects and switching networks.
Rating Distribution
Ease of use
10
Value for money
9
Customer Support
10
Functionality
7
Information Technology and Services, 1-10 employees
More than a year
“ThreatLocker is the way to go!”
Pros
I really like the security it provides with minimal struggle for the end user. When set up correctly, it establishes safe boundaries for client systems without significantly impacting performance.
Cons
Threat Locker is a complex tool with numerous components. It is not designed for a plug-and-play experience, it requires time to set up and manage properly. There is a significant time investment initially. However, unlike other companies threatLocker does not just sell the product and leave you to handle it alone. They provide regular support check-ins to ensure optimal performance and offer 24/7 assistance for any questions regarding the service or best practices. They also have a training platform to help your team learn to use the software effectively. Although it requires effort, the benefits are substantial.
Rating Distribution
Ease of use
9
Value for money
10
Customer Support
10
Functionality
10
Frequently Asked Questions
Does ThreatLocker offer an API?
Yes, ThreatLocker offers API.
What language does ThreatLocker support?
ThreatLocker supports English.
What other apps does ThreatLocker integrate with?
Schedule a free demo to learn about ThreatLocker’s integrations.
Does ThreatLocker support mobile devices?
Yes, ThreatLocker supports Android and iOS devices.
What types of pricing plans does ThreatLocker offer?
ThreatLocker pricing varies depending on your organization's type and specific needs. Users can easily get pricing details tailored to their requirements.
Who are the typical users of ThreatLocker?
The typical users of ThreatLocker are financial services, government and healthcare industries.
What level of support does ThreatLocker offer?
ThreatLocker offers email, FAQs, chat, Knowledge Base and phone support.
