ThreatLocker software provides powerful application control and endpoint security, enabling businesses to manage which applications can run on their systems. Although the setup process can be challenging for smaller teams, the granular control it offers makes it an excellent choice for organizations committed to robust network security.

ThreatLocker Specifications

Security Measure

Firewall Protection

Anti-Virus and Anti-Malware

Data Encryption

View All Specifications

What Is ThreatLocker?

Overview

ThreatLocker is a cloud-based cyber security solution designed for businesses of all sizes, particularly in industries with stringent security requirements like healthcare and government. It offers application whitelisting, ring-fencing, and storage control to help organizations protect against ransomware, malware, and unauthorized access. What does ThreatLocker do? By permitting only approved applications to run, it significantly reduces the risk of breaches and data loss, effectively addressing challenges like unauthorized software use and endpoint vulnerabilities.

ThreatLocker Pricing

Threatlocker cost will differ depending on your organization type and needs. Users can get pricing details for the plan that best suits them.

ThreatLocker Integrations

The vendor site does not mention any integrations. Watch a free ThreatLocker demo to learn more.

Who Is ThreatLocker For?

The software is designed for businesses of all sizes across various industries, including:

  • Financial services
  • MSP/MSSP
  • Healthcare
  • Education
  • Government

Is ThreatLocker Right For You

As a leading solution in the cybersecurity space, ThreatLocker empowers organizations to maintain a secure and compliant environment. What ThreatLocker is used for is to protect against vulnerabilities. It is scalable and compliant with NIST, PCI DSS, and ZITNA standards.

Still not sure if ThreatLocker is right for you? Get in touch with our customer support team at (661) 384-7070, and it will help you make the best decision.

ThreatLocker Features

ThreatLocker ensures that only pre-approved applications and files can run on your system, blocking all others by default. This reduces the risk of malware and unauthorized software, providing an additional layer of security and control.

how it worksSee How It Works

This feature restricts the interactions between applications, limiting what each can access or modify. This containment strategy prevents malicious activities from spreading, thereby enhancing security by isolating potential threats within your network.

how it worksSee How It Works

Network Control enables you to manage and restrict network access at the application level. By controlling which applications can communicate over the network, it mitigates the risk of data exfiltration and unauthorized access, bolstering overall network security.

how it worksSee How It Works

The Cyber Hero program provides real-time support and guidance from cybersecurity experts, helping businesses implement and manage their security policies effectively. This personalized support ensures optimal configuration and reduces the burden on in-house IT teams.

how it worksSee How It Works

ThreatLocker Direct offers direct-to-cloud protection, bypassing traditional network layers for faster, more efficient security management. It enables businesses to enforce policies and monitor activities from the cloud, streamlining operations and enhancing response times in threat scenarios.

how it worksSee How It Works

Pros and Cons of ThreatLocker

Pros

  • Mobile app
  • Extensive customization options
  • User-friendly management interface available
  • Excellent customer support

Cons

  • Limited third-party integrations available
  • Initial workload of onboarding software
  • Advanced features may overwhelm users

ThreatLocker Reviews

Overall Rating

4.9

49 Review(s)

Rating Distribution

5

star

(45)

4

star

(4)

3

star

2

star

1

star

August 2024

Skycomp Solutions trusts ThreatLocker

Ana

IT

Ease of use

10

Value for money

10

Customer Support

10

Functionality

10

Pros

We've been using ThreatLocker for quite sometime now and it's really dependable. It detected many threats and kept us safe from many cyber attacks.

Cons

ThreatLocker tends to be a bit too sensitive when I download stuff from the web even from trusted sites. I often have to submit a ticket and wait for approval which can slow me down at times. But when I see the stats the extra effort seems worth it.

June 2024

ThreatLocker - Answer to security augmentation for Microsoft Defender

Brian

IT

Ease of use

9

Value for money

10

Customer Support

10

Functionality

10

Pros

ThreatLocker stand out from typical MSP vendors cause they focus on integrity instead of follow trends. Through my experience with them I have come to trust their dedication to being a solid partner in our cybersecurity efforts. They act as an active guard against threats like Defender with their default deny approach eliminating false positives in SOC monitoring of EDR data which bring peace of mind. Adopting this strict method have helped us feel more secure.

Cons

Switching to a default deny strategy had a bigger impact than I thought it would. At first the workload was more than expected but Cyberhero support quickly proved invaluable. If you are going this route I did recommend having weekly meetings to fine-tune your initial policies. Its an effort that really pays off in securing the system.

June 2024

Great Security

Franc

Not Specified

Ease of use

10

Value for money

10

Customer Support

10

Functionality

10

Pros

Simple to use, easy setup and the team always ready to help.

Cons

The price compared to some other products is currently ahead of the market.

June 2024

Red Key Solutions ThreatLocker review

Matt

Information Technology and Services

Ease of use

7

Value for money

10

Customer Support

10

Functionality

10

Pros

I appreciate the security it offers particularly its feature to deny anything not allowed. Customer service and support are excellent.

Cons

it takes time to learn due to the multitude of features. It has improved as they have expanded the BuiltIn App library, enhanced training videos, and offered a more comprehensive service option.

June 2024

ThreatLocker one stop shopping for security

Daniel

Information Technology and Services

Ease of use

10

Value for money

10

Customer Support

10

Functionality

10

Pros

The software provides a zero trust solution.

Cons

The product is easy to use but requires training on a few specific items initially.

June 2024

Love ThreatLocker

John

Information Technology and Services

Ease of use

8

Value for money

10

Customer Support

10

Functionality

10

Pros

The ThreatLocker platform addresses numerous needs and continues to expand. The team is exceptional, I have always been promptly connected with someone knowledgeable. For cybersecurity, ThreatLocker serves as one of our primary defenses against ransomware and other malware.

Cons

When utilizing the allow listing feature, ThreatLocker can become quite noisy and demand significant maintenance. If users do not frequently open random software after the learning phase, the system works well. Threatlocker is powerful but understanding how to effectively use it is crucial.

June 2024

ThreatLocker is the way to go!

Richard

Information Technology and Services

Ease of use

9

Value for money

10

Customer Support

10

Functionality

10

Pros

I really like the security it provides with minimal struggle for the end user. When set up correctly, it establishes safe boundaries for client systems without significantly impacting performance.

Cons

Threat Locker is a complex tool with numerous components. It is not designed for a plug-and-play experience, it requires time to set up and manage properly. There is a significant time investment initially. However, unlike other companies threatLocker does not just sell the product and leave you to handle it alone. They provide regular support check-ins to ensure optimal performance and offer 24/7 assistance for any questions regarding the service or best practices. They also have a training platform to help your team learn to use the software effectively. Although it requires effort, the benefits are substantial.

June 2024

Threatlocker Zero Trust

Kyle

Mining & Metals

Ease of use

10

Value for money

9

Customer Support

10

Functionality

7

Pros

Application whitelisting was quite simple for most of our installation. ThreatLocker automatically learned all our applications and manages updates without our intervention. When custom rules are necessary, the user interface guides me through the process and alerts administrators if policies are insecure or too broad. Network control provides an easy way to implement network microsegmentation and the audit tools simplify determining port communications between hosts. The ThreatLocker Administrator Password System in the configuration manager allowed us to retire our Microsoft Local Administrator Password Solution. Setup took less than five minutes with no complex Group Policy Objects or additional programs. Support is immediate and knowledgeable, with very small wait times for help any time of day via chat.

Cons

The Network control feature tends to encounter issues when using Threatlocker specific objects and switching networks.

May 2024

It's key to securing an enviorment

Jason

Information Technology and Services

Ease of use

9

Value for money

9

Customer Support

9

Functionality

8

Pros

Its core ability to lock down an environment is essential to ensure a company's protection by controlling what can be installed or used on critical systems.

Cons

There is some effort needed to emphasize the importance of system security to clients but once they grasp the benefits, they are generally supportive of the process.

May 2024

Great tool

Stephen

Defense & Space

Ease of use

9

Value for money

10

Customer Support

10

Functionality

10

Pros

Ease of setup and installation is impressive, with great features and many tools included.

Cons

Many of the additional features or tools come with extra costs per app such as admin by request. The installation is cloud only with no on-premise options.

Frequently Asked Questions

Yes, ThreatLocker offers API.