ThreatLocker Logo Award Winner Product Badge
ThreatLocker Logo Award Winner Product Badge
ThreatLocker, Inc.

ThreatLocker

Composite Score
9.1 /10
CX Score
9.3 /10
ThreatLocker
9.1 /10

What is ThreatLocker?

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatLocker won the following awards in the Endpoint Protection - Enterprise category

Filter By

ThreatLocker Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatLocker.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

94 Likeliness to Recommend

1
Since last award

98 Plan to Renew

84 Satisfaction of Cost Relative to Value

2
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatLocker?

1% Negative
2% Neutral
97% Positive

Pros

  • Continually Improving Product
  • Trustworthy
  • Client Friendly Policies
  • Fair

Feature Ratings

Average 86

System Hardening

92

Centralized Management Portal

92

Application Containment Mechanisms

90

Port and Device Control

88

Flexible Deployment Options

87

Forensics

87

Kernel Monitoring

87

Host NGFW Functionality

87

Dynamic Malware Detection

83

Cross Platform Integration

80

Cross Platform Support

79

Vendor Capability Ratings

Average 85

Vendor Support

92

Availability and Quality of Training

90

Product Strategy and Rate of Improvement

89

Business Value Created

89

Quality of Features

87

Breadth of Features

86

Ease of Implementation

84

Ease of Data Integration

84

Usability and Intuitiveness

83

Ease of Customization

80

Ease of IT Administration

77

ThreatLocker Reviews

Cedric H.

  • Role: Information Technology
  • Industry: Other
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted May 2025

How ThreatLocker Prevents Cyber Threats

Likeliness to Recommend

8 /10

What differentiates ThreatLocker from other similar products?

Unlike other EDR and antivirus software, Threatlocker does not depend on signature-based and behavioral detection. Its “default deny” approach does not allow the execution of unauthorized software, thus preventing attacks. ThreatLocker’s Ring-fencing limits the functioning of the applications even if they are supposed to run. Where others provide basic USM blocking, ThreaLocker provides control over storage access.

What is your favorite aspect of this product?

ThreatLocker offers dynamic network control by restricting the link of applications to the network, thus adding an extra layer of protection. In cybersecurity, the response time is very important. I appreciate this software for giving fast and knowledge-based support to aware us from minor and major losses. Its Ringfencing feature keeps the applications restricted from any suspicious behavior. Moreover, I would say it provides and secure services and we feel we are working in safe environment.

What do you dislike most about this product?

Threatlocker does not protect SaaS applications like other platforms. ThreatLocker is sometimes complex, so detailed guidelines should be provided for proper understanding of its functioning. It lacks flexibility in customization and is sometimes rigid. Due to a strict approach, there are chances that updates can be marked as dislikes.

What recommendations would you give to someone considering this product?

First, you have to focus on how it fits according to work and how much time it consumes in the adjustment and maintenance of the rules. If you are considering cloud services, you have to find out whether Threatlock provides security features in that regard or not.

Pros

  • Helps Innovate
  • Reliable
  • Unique Features
  • Efficient Service

Pallavi V.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: Initial Implementation
Validated Review
Verified Reviewer

Submitted May 2025

Robust security with zero trust precision

Likeliness to Recommend

10 /10

What differentiates ThreatLocker from other similar products?

Zero trust application control Endpoint protection Managed detection and response

What is your favorite aspect of this product?

Zero trust control application Default deny approach Customisable policies

What do you dislike most about this product?

Complexity Resource intensive

What recommendations would you give to someone considering this product?

Assess security needs Plan implementation Configure policies carefully

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Role: Information Technology
  • Industry: Insurance
  • Involvement: End User of Application
Validated Review
Anonymous Reviewer

Submitted Sep 2024

User friendly, easy to manage.

Likeliness to Recommend

9 /10

Pros

  • Continually Improving Product
  • Enables Productivity
  • Trustworthy
  • Efficient Service

Most Popular ThreatLocker Comparisons