


What is ThreatLocker?
ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceThreatLocker Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on ThreatLocker.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
95 Likeliness to Recommend
98 Plan to Renew
86 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+95 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love ThreatLocker?
Pros
- Helps Innovate
- Continually Improving Product
- Trustworthy
- Client Friendly Policies
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
System Hardening
Centralized Management Portal
Application Containment Mechanisms
Port and Device Control
Flexible Deployment Options
Kernel Monitoring
Forensics
Host NGFW Functionality
Dynamic Malware Detection
Cross Platform Integration
Cross Platform Support
Vendor Capability Ratings
Vendor Support
Availability and Quality of Training
Business Value Created
Product Strategy and Rate of Improvement
Quality of Features
Breadth of Features
Ease of Data Integration
Ease of Implementation
Usability and Intuitiveness
Ease of Customization
Ease of IT Administration
Also Featured in...
Application Control

Unified Audit

Approval Center

Industry Leading Support - Chat with a Cyber Hero

Are Your Employees Adding Security Holes? | ThreatLocker 60 Second TV Spot
ThreatLocker Success Story - Advanced Medical Transport
ThreatLocker Success Story - Stampede Meats
ThreatLocker Testimonial - Redner's Markets
ThreatLocker Success Story - Hattiesburg Clinic
ThreatLocker Success Story - Pioneer-360
Demo 2023: Deployment
Demo 2023: Allowlisting
Demo 2023: Ringfencing
Demo 2023: Elevation Control
Demo 2023: Storage Control
Demo 2023: Network Control (NAC)
ThreatLocker Reviews

Jason N.
- Role: C-Level
- Industry: Technology
- Involvement: Business Leader or Manager
Submitted Aug 2023
Peace of Mind
Likeliness to Recommend
What differentiates ThreatLocker from other similar products?
It just works and there is always a way to get needed support quickly.
What is your favorite aspect of this product?
It protects my clients' networks from unintentionally causing themselves problems.
What do you dislike most about this product?
It does take some time to learn and know how to use the software.
What recommendations would you give to someone considering this product?
Just give it a try. If you do a good job learning and implementing the software, you will not be disappointed.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Please tell us why you think this review should be flagged.
- Role: C-Level
- Industry: Technology
- Involvement: Business Leader or Manager
Submitted Aug 2023
Fantastic solution!
Likeliness to Recommend
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Please tell us why you think this review should be flagged.

Mgcini M.
- Role: Information Technology
- Industry: Finance
- Involvement: Business Leader or Manager
Submitted Aug 2023
Powerful tool enhancing security - Pro Toolkit!
Likeliness to Recommend
What differentiates ThreatLocker from other similar products?
ThreatLocker stands out from other similar products due to its distinctive application whitelisting approach. Instead of relying on traditional blacklisting, ThreatLocker focuses on permitting only approved applications to run, preventing unapproved software execution. This granular control provides robust protection against day-one threats, malware, and ransomware. Additionally, ThreatLocker's policy-driven management and seamless integration with existing security tools make it a comprehensive and user-friendly solution for organisations seeking a strong and effective security posture.
What is your favorite aspect of this product?
One of the notable aspects of ThreatLocker is its application whitelisting approach, which sets it apart from other security products. This method offers enhanced protection by allowing only approved applications to run, reducing the risk of unauthorised software execution and potential security breaches.
What do you dislike most about this product?
Depending on an organisation's existing IT infrastructure and applications, implementing and fine-tuning the whitelisting policies might require some effort and time. It's always essential for users to thoroughly evaluate the product to determine if it aligns with their specific needs and requirements, which I'm positive you will find it does.
What recommendations would you give to someone considering this product?
Assess needs and align with product capabilities. Pilot in a controlled environment first. Involve your IT staff and end-users for feedback. Plan implementation and provide training. Fine-tune whitelisting policies for balance. Regularly monitor and analyse logs for threats. Stay updated with features and best practices. Evaluate support and integration with existing tools. Compare with alternatives for the best fit - *important* Remember, security is an ongoing process; combine layers and best practices for a robust security posture.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Please tell us why you think this review should be flagged.
Get Instant Access<br>to this Report
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.
© 2025 SoftwareReviews.com. All rights reserved.
