Overview
What is ThreatLocker?
ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic.
Recent Reviews
Reviewer Pros & Cons
Pricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
115 people also want pricing
Alternatives Pricing
Product Demos
Threatlocker Powerlunch
YouTube
ThreatLocker Control (™) Demo Part 4
YouTube
ITBOG Livestream Demo - ThreatLocker
YouTube
Threatlocker | Live Demo
YouTube
ThreatLocker Control (™) Demo Part 3
YouTube
ITBOG Livestream Demo - ThreatLocker
YouTube
Product Details
- About
- Competitors
- Tech Details
- FAQs
What is ThreatLocker?
ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic. Ringfencing™ adds a second line of defense for applications that are permitted. First, by defining how applications can interact with each other, and secondly, by controlling what resources applications can access, such as networks, files, and registries.
Additional capabilities include:
Additional capabilities include:
Protects data from malicious behavior
Stops fileless malware and limit damage from application exploits
Defines how applications integrate with other applications
Stops applications from interacting with other applications, network resources, registry keys, files.
Stop sapplications from interacting with built-in tools such as PowerShell, Command Prompt and RunDLL
Stops built-in tools from accessing file shares
"Allowlisting" controls what software, scripts, executables, and libraries can run on endpoints and servers. This approach not only stops malicious software, but it also stops other unpermitted applications from running.
"Allowlisting" controls what software, scripts, executables, and libraries can run on endpoints and servers. This approach not only stops malicious software, but it also stops other unpermitted applications from running.
ThreatLocker Screenshots
ThreatLocker Videos
Product Demonstration
3 Approaches to Protect a Business from Ransomware (ThreatLocker Webinar)
ThreatLocker Success Story - TCI Technologies
ThreatLocker Competitors
ThreatLocker Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Unspecified |
Mobile Application | No |
Frequently Asked Questions
ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic.
SentinelOne Vigilance, Huntress, and SpamTitan Email Security are common alternatives for ThreatLocker.
Reviewers rate Anti-Exploit Technology highest, with a score of 9.5.
The most common users of ThreatLocker are from Small Businesses (1-50 employees).