ThreatLocker software provides powerful application control and endpoint security, enabling businesses to manage which applications can run on their systems. Although the setup process can be challenging for smaller teams, the granular control it offers makes it an excellent choice for organizations committed to robust network security.

ThreatLocker Specifications

Security Measure

Firewall Protection

Anti-Virus and Anti-Malware

Data Encryption

View All Specifications

What Is ThreatLocker?

Overview

ThreatLocker is a cloud-based cyber security solution designed for businesses of all sizes, particularly in industries with stringent security requirements like healthcare and government. It offers application whitelisting, ring-fencing, and storage control to help organizations protect against ransomware, malware, and unauthorized access. What does ThreatLocker do? By permitting only approved applications to run, it significantly reduces the risk of breaches and data loss, effectively addressing challenges like unauthorized software use and endpoint vulnerabilities.

ThreatLocker Pricing

Threatlocker cost will differ depending on your organization type and needs. Users can get pricing details for the plan that best suits them.

ThreatLocker Integrations

The vendor site does not mention any integrations. Watch a free ThreatLocker demo to learn more.

Who Is ThreatLocker For?

The software is designed for businesses of all sizes across various industries, including:

  • Financial services
  • MSP/MSSP
  • Healthcare
  • Education
  • Government

Is ThreatLocker Right For You

As a leading solution in the cybersecurity space, ThreatLocker empowers organizations to maintain a secure and compliant environment. What ThreatLocker is used for is to protect against vulnerabilities. It is scalable and compliant with NIST, PCI DSS, and ZITNA standards.

Still not sure if ThreatLocker is right for you? Get in touch with our customer support team at (661) 384-7070, and it will help you make the best decision.

ThreatLocker Features

ThreatLocker ensures that only pre-approved applications and files can run on your system, blocking all others by default. This reduces the risk of malware and unauthorized software, providing an additional layer of security and control.

how it worksSee How It Works

This feature restricts the interactions between applications, limiting what each can access or modify. This containment strategy prevents malicious activities from spreading, thereby enhancing security by isolating potential threats within your network.

how it worksSee How It Works

Network Control enables you to manage and restrict network access at the application level. By controlling which applications can communicate over the network, it mitigates the risk of data exfiltration and unauthorized access, bolstering overall network security.

how it worksSee How It Works

The Cyber Hero program provides real-time support and guidance from cybersecurity experts, helping businesses implement and manage their security policies effectively. This personalized support ensures optimal configuration and reduces the burden on in-house IT teams.

how it worksSee How It Works

ThreatLocker Direct offers direct-to-cloud protection, bypassing traditional network layers for faster, more efficient security management. It enables businesses to enforce policies and monitor activities from the cloud, streamlining operations and enhancing response times in threat scenarios.

how it worksSee How It Works

Pros and Cons of ThreatLocker

Pros

  • Mobile app
  • Extensive customization options
  • User-friendly management interface available
  • Excellent customer support

Cons

  • Limited third-party integrations available
  • Initial workload of onboarding software
  • Advanced features may overwhelm users

ThreatLocker Reviews

Overall Rating

4.9

49 Review(s)

Rating Distribution

5

star

(45)

4

star

(4)

3

star

2

star

1

star

August 2024

Skycomp Solutions trusts ThreatLocker

Ana

IT

Ease of use

10

Value for money

10

Customer Support

10

Functionality

10

Pros

We've been using ThreatLocker for quite sometime now and it's really dependable. It detected many threats and kept us safe from many cyber attacks.

Cons

ThreatLocker tends to be a bit too sensitive when I download stuff from the web even from trusted sites. I often have to submit a ticket and wait for approval which can slow me down at times. But when I see the stats the extra effort seems worth it.

June 2024

Threatlocker Zero Trust

Kyle

Mining & Metals

Ease of use

10

Value for money

9

Customer Support

10

Functionality

7

Pros

Application whitelisting was quite simple for most of our installation. ThreatLocker automatically learned all our applications and manages updates without our intervention. When custom rules are necessary, the user interface guides me through the process and alerts administrators if policies are insecure or too broad. Network control provides an easy way to implement network microsegmentation and the audit tools simplify determining port communications between hosts. The ThreatLocker Administrator Password System in the configuration manager allowed us to retire our Microsoft Local Administrator Password Solution. Setup took less than five minutes with no complex Group Policy Objects or additional programs. Support is immediate and knowledgeable, with very small wait times for help any time of day via chat.

Cons

The Network control feature tends to encounter issues when using Threatlocker specific objects and switching networks.

June 2024

ThreatLocker is the way to go!

Richard

Information Technology and Services

Ease of use

9

Value for money

10

Customer Support

10

Functionality

10

Pros

I really like the security it provides with minimal struggle for the end user. When set up correctly, it establishes safe boundaries for client systems without significantly impacting performance.

Cons

Threat Locker is a complex tool with numerous components. It is not designed for a plug-and-play experience, it requires time to set up and manage properly. There is a significant time investment initially. However, unlike other companies threatLocker does not just sell the product and leave you to handle it alone. They provide regular support check-ins to ensure optimal performance and offer 24/7 assistance for any questions regarding the service or best practices. They also have a training platform to help your team learn to use the software effectively. Although it requires effort, the benefits are substantial.

Frequently Asked Questions

Yes, ThreatLocker offers API.