Akamai Guardicore Segmentation vs. ThreatLocker

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Akamai Guardicore Segmentation
Score 9.1 out of 10
N/A
Guardicore is a segmentation company, now part of Akamai since the late 2021 acquisition, aiming to displace legacy firewalls. The Guardiocre software-only approach is decoupled from the physical network to provide a faster alternative to firewalls. It is built for the agile enterprise that offers greater security and visibility in the cloud, data-center and endpoint.N/A
ThreatLocker
Score 9.0 out of 10
N/A
ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic.N/A
Pricing
Akamai Guardicore SegmentationThreatLocker
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Akamai Guardicore SegmentationThreatLocker
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsContact vendor for pricing information.
More Pricing Information
Community Pulse
Akamai Guardicore SegmentationThreatLocker
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
Akamai Guardicore SegmentationThreatLocker
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Akamai Guardicore Segmentation
-
Ratings
ThreatLocker
9.0
4 Ratings
7% above category average
Anti-Exploit Technology00 Ratings9.54 Ratings
Endpoint Detection and Response (EDR)00 Ratings8.74 Ratings
Centralized Management00 Ratings8.74 Ratings
Hybrid Deployment Support00 Ratings10.01 Ratings
Infection Remediation00 Ratings8.84 Ratings
Vulnerability Management00 Ratings7.94 Ratings
Malware Detection00 Ratings9.34 Ratings
Best Alternatives
Akamai Guardicore SegmentationThreatLocker
Small Businesses
NinjaOne
NinjaOne
Score 9.2 out of 10
Kaspersky Endpoint Security
Kaspersky Endpoint Security
Score 9.0 out of 10
Medium-sized Companies
Nmap
Nmap
Score 9.5 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
Nmap
Nmap
Score 9.5 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 9.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Akamai Guardicore SegmentationThreatLocker
Likelihood to Recommend
8.0
(1 ratings)
8.7
(5 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(1 ratings)
Usability
9.0
(1 ratings)
10.0
(1 ratings)
Availability
-
(0 ratings)
10.0
(1 ratings)
Performance
-
(0 ratings)
10.0
(1 ratings)
Support Rating
9.0
(1 ratings)
10.0
(1 ratings)
In-Person Training
-
(0 ratings)
10.0
(1 ratings)
Online Training
-
(0 ratings)
10.0
(1 ratings)
Implementation Rating
-
(0 ratings)
10.0
(1 ratings)
Product Scalability
-
(0 ratings)
10.0
(1 ratings)
Vendor post-sale
-
(0 ratings)
10.0
(1 ratings)
Vendor pre-sale
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
Akamai Guardicore SegmentationThreatLocker
Likelihood to Recommend
Akamai
This is the best possible solution for enterprise-level organizations where server counts will be in the thousands. To manage these and understand the communication can be very cumbersome without this tool. Ease of creation map zone and application-wise can be relaxing to OS teams and support teams as well. There is no limit to labeling schema of servers and it gives the freedom to do so.
Read full review
ThreatLocker
I have tested two of software besides ThreatLocker. ThreatLocker by far, was the easiest of the 3 to work with and setup. One of the companies' software was too complicated to run and setup. The other one lacked a lot of the features that ThreatLocker had. ThreatLocker came with many prebuilt template for common software and utilities, like Office365, putty, Firefox, Google, etc. It came with a bunch of prebuilt blocking/ringfencing rules for utilities like powershell, hyper-v psexec, and many others. This saves setup time. Unfortunately, ThreatLocker will let you download something from the MS Store, sometime it will let you execute and sometimes it won't. I would like to see this to be able to block the download from MS Store until ThreatLocker approves the download.
Read full review
Pros
Akamai
  • Network traffic flow within environment of organization.
  • Creating maps for visibility and drill down is a key feature.
  • Labelling of servers can be done via running script.
  • Alerts can be sensitized for the traffic not seen.
Read full review
ThreatLocker
  • Application Control
  • Privileged Access Management
  • Storage access control
Read full review
Cons
Akamai
  • Limited support to legacy infrastructure.
  • Integration with third party is a bit tedious.
  • Awaiting support for Kubernetes in the next version.
Read full review
ThreatLocker
  • Ease of moving between organizations
  • Removing agents from clients who depart
  • Some UNC path definitions for local files and folders
Read full review
Likelihood to Renew
Akamai
No answers on this topic
ThreatLocker
ThreaLocker has done its job and has prevented malware from executing. It has stopped an encryption process once already. It has kept a user from going to a bad website. He tried twice and was wondering why he was getting an error message from ThreatLocker and ESET both.
Read full review
Usability
Akamai
The solution is deployed throughout the organization. Teams are working and integrating it with the help desk tool wherever required. Helps in identifying the network traffic flows in lateral movement and east and west as well. Allows policies by default and later fine-tuning to be done to narrow it and enforce blocking action. Exporting reports from the tool is easy and can be observed for any issues.
Read full review
ThreatLocker
ThreatLocker ease of use allows me to get the answers I need to any threats or denied action that ThreatLocker took. The "Unified Audit" is a great tool to show what is happening/executing on a user's computer or on a server. Unified Audit will allow to look at what steps a programs takes when it executes. It will show you if it calls on Powershell or what DLL's it is executing and many other things.
Read full review
Reliability and Availability
Akamai
No answers on this topic
ThreatLocker
There is rarely ever an outage. I have seen slowness in ThreatLocker service. But that is very rare too!
Read full review
Performance
Akamai
No answers on this topic
ThreatLocker
ThreatLocker is always available. The admin's console loads very fast and report runs almost instantly. It does not interfere with operating system.
Read full review
Support Rating
Akamai
Support has been available 24*7. It also depends on criticality but support is available. Also, the right expertise from the team helps in identifying the issue quickly and this helps in less production downtime if required. The ticket is resolved with RCA.
Read full review
ThreatLocker
You can email, call or do online chat with tech support. I love their online chat. They are quick and friendly. Also, if you need to show them something, you can give the chat technician permission from your Chat box to allow the tech access to your computer. They also can pull out your admin console on their side. They can look at your "Unified Audit" log and see the same thing that you can. They have a good KnowledgeBase that you can look for answers. They have what is called "ThreatLocker University" where you can go through tutorials and take tests.
Read full review
In-Person Training
Akamai
No answers on this topic
ThreatLocker
The owners and co-founders work with you through Zoom Meetings. They walk you through how to use and setup ThreatLocker. They also have webinars. You also can go through ThreatLocker University online training.
Read full review
Online Training
Akamai
No answers on this topic
ThreatLocker
Using ThreatLocker University online training is very easy and informative. You take online tests to see how well you learned the material. It is great!
Read full review
Implementation Rating
Akamai
No answers on this topic
ThreatLocker
ThreatLocker is a family ran business. The owners, co-founders work with you to ensure you are up and running as quickly as possible. They went to ensure your success with ThreatLocker.
Read full review
Alternatives Considered
Akamai
1) No limit to labeling schema. 2) Ease of creating maps with respect to zone, environment, subnets, etc. 3) Ease of creating policies and publishing the same. 4) Deception 5) Integration with monitoring tool (grafana) 6) Changes in the agent can be considered if there are legacy systems, time-consuming but can be achieved with the right information.
Read full review
ThreatLocker
I honestly have not seen many other programs like Threatlocker so I do not have any to compare to. Auto-Elevate may be the closest, however I did not evaluate them as part of my decision. Threatlocker does do a great job at onboarding which made deploying, setting up, and troubleshooting the program a breeze
Read full review
Scalability
Akamai
No answers on this topic
ThreatLocker
ThreatLocker is very easy to add new ThreatLocker agents on computers and servers. It is very easy to do. You can install an agent on a computer or server in about 2 minutes or less.
Read full review
Return on Investment
Akamai
  • Blocking unwarranted traffic can really boost security of organization.
  • Alerts can be triggered to SIEM servers and help in timely action.
  • Need to be very careful before configuring and publishing block policies in the production environment.
Read full review
ThreatLocker
  • Too early on to tell, however, if ThreatLocker ends up blocking just one ransomware attack for any of our clients, I'd argue that it payed for itself.
Read full review
ScreenShots

ThreatLocker Screenshots

Screenshot of ThreatLocker