Likelihood to Recommend I think Kaspersky is well suited for large and small companies. Larger companies can take advantage of the KSC (Kaspersky Security Center) servers to help manage a large network. The KSC has many good features to help monitor the health of the organization. It does a good job with updating and deploying remotely. It has inventory features, and can even deploy non-Kaspersky software packages uploaded to the center. KSC can become a source of good information about [your] network that can be seen at a glance. IT departments are normally smaller than they need to be. KSC helps with larger and smaller companies because of this. A small company would appreciate the amount of information and management that can be done through KSC without needing extra help. If the company is small enough that they don't have servers on-site, there is a cloud version. I have not used that to know how it differs from the local KSC.
Read full review I have tested two of software besides ThreatLocker. ThreatLocker by far, was the easiest of the 3 to work with and setup. One of the companies' software was too complicated to run and setup. The other one lacked a lot of the features that ThreatLocker had. ThreatLocker came with many prebuilt template for common software and utilities, like Office365, putty, Firefox, Google, etc. It came with a bunch of prebuilt blocking/ringfencing rules for utilities like powershell, hyper-v psexec, and many others. This saves setup time. Unfortunately, ThreatLocker will let you download something from the MS Store, sometime it will let you execute and sometimes it won't. I would like to see this to be able to block the download from MS Store until ThreatLocker approves the download.
Read full review Pros The Security Center is laid out very well and makes it easy to install and manage the client endpoint protection on servers and workstations. The way security policies are defined and managed is very easy to understand. The client programs seem to be lighter and smaller on the client systems than others I have used in the past. Using fewer resources is always an advantage. Read full review Application Control Privileged Access Management Storage access control Read full review Cons The PC imaging tools are difficult to set up and use Device Encryption tools are getting better, but are difficult to manage. The policies are powerful, but could be broken up. More help can be provided in what the policy element does within the policy setup Read full review Ease of moving between organizations Removing agents from clients who depart Some UNC path definitions for local files and folders Read full review Likelihood to Renew The product is stable and accurate in detecting security threats. There are very few or no false positives in detecting security threats or unusual behavior and has very sharp heuristics. The product does the job very well including saving us money in getting 3rd party patch management tools as the business is already using Microsoft System Center Configuration Manager which is Microsoft product specific and the product patches these third party products e.g Adobe Flash Player
Read full review ThreaLocker has done its job and has prevented malware from executing. It has stopped an encryption process once already. It has kept a user from going to a bad website. He tried twice and was wondering why he was getting an error message from ThreatLocker and ESET both.
Read full review Usability The integration with a known solution is not good (Cisco ISE), product (10.x) does not automate remediation, however security is great and detects security threats with accuracy including heuristics, very few or no false positives
Read full review ThreatLocker ease of use allows me to get the answers I need to any threats or denied action that ThreatLocker took. The "Unified Audit" is a great tool to show what is happening/executing on a user's computer or on a server. Unified Audit will allow to look at what steps a programs takes when it executes. It will show you if it calls on Powershell or what DLL's it is executing and many other things.
Read full review Reliability and Availability I've used the on-premise server. I've only experienced one time that we couldn't open the console, and that was a server issue. It seems to be a dependable solution. It's there, and it's stable.
Read full review There is rarely ever an outage. I have seen slowness in ThreatLocker service. But that is very rare too!
Read full review Performance Users don't notice any slowdown with the antivirus running on their systems. There have been issues when the systems have missed a scheduled scan, and it was checked to run at [a] first available time, they will start a full scan at startup. This has caused some lag. Normally there are also some issues with the workstation, but it is something to note.
Read full review ThreatLocker is always available. The admin's console loads very fast and report runs almost instantly. It does not interfere with operating system.
Read full review Support Rating I give the maximum grade because we have no complaints; we never had any failure, serious error, and serious threat to the company. All of its features work very well. The great advantage of having a product supported by an industry-leading security company is that regularly updated security protocols will protect the system against all emerging threats.
Read full review You can email, call or do online chat with tech support. I love their online chat. They are quick and friendly. Also, if you need to show them something, you can give the chat technician permission from your Chat box to allow the tech access to your computer. They also can pull out your admin console on their side. They can look at your "Unified Audit" log and see the same thing that you can. They have a good KnowledgeBase that you can look for answers. They have what is called "ThreatLocker University" where you can go through tutorials and take tests.
Read full review In-Person Training The owners and co-founders work with you through Zoom Meetings. They walk you through how to use and setup ThreatLocker. They also have webinars. You also can go through ThreatLocker University online training.
Read full review Online Training Using ThreatLocker University online training is very easy and informative. You take online tests to see how well you learned the material. It is great!
Read full review Implementation Rating Make sure to provide awareness campaigns on changes that will be implemented and WHY the business is doing it and the benefits reaped. Benefits reaped is very important for the justification of why things have to change and emphasizing the importance of security. This will reduce user disgruntlement and total bitterness on use of their workstation or laptop
Read full review ThreatLocker is a family ran business. The owners, co-founders work with you to ensure you are up and running as quickly as possible. They went to ensure your success with ThreatLocker.
Read full review Alternatives Considered Kaspersky is a leader in endpoint protection, but its ties to potential adversaries are unsettling. Kaspersky has a great threat research team and quickly identifies malicious software and its signature. Its web-based protection is also top notch. This is a great product but as with everything has its place.
Read full review I honestly have not seen many other programs like Threatlocker so I do not have any to compare to. Auto-Elevate may be the closest, however I did not evaluate them as part of my decision. Threatlocker does do a great job at onboarding which made deploying, setting up, and troubleshooting the program a breeze
Read full review Scalability You can create groups and create different policies for each group. You can customize many parts of the software before it is deployed. You can create different tasks and schedules based on the groups. It is customizable.
Read full review ThreatLocker is very easy to add new ThreatLocker agents on computers and servers. It is very easy to do. You can install an agent on a computer or server in about 2 minutes or less.
Read full review Return on Investment It reduced the incidents of infections and so reduced the efforts needed by the IT department to mitigate problems. It made it difficult to manage the security of our growing mobile user base due to infrequent contact with our on-premise management server. Read full review Too early on to tell, however, if ThreatLocker ends up blocking just one ransomware attack for any of our clients, I'd argue that it payed for itself. Read full review ScreenShots