Likelihood to Recommend If I had to recommend an endpoint AV solution, [BlackBerry Protect (CylancePROTECT)] would be on the list...in fact at the top of the current list. It is a cost effective solution. When we did the bakeoff in our selection we built 3 generic W10 PCs. We located a Malware repository on the internet and downloaded a package of 100. The first solution stopped 80% from installing, the second stopped 100%, [BlackBerry (CylancePROTECT)] would not let the package download! Winner winner chicken dinner :)
Read full review I have tested two of software besides ThreatLocker. ThreatLocker by far, was the easiest of the 3 to work with and setup. One of the companies' software was too complicated to run and setup. The other one lacked a lot of the features that ThreatLocker had. ThreatLocker came with many prebuilt template for common software and utilities, like Office365, putty, Firefox, Google, etc. It came with a bunch of prebuilt blocking/ringfencing rules for utilities like powershell, hyper-v psexec, and many others. This saves setup time. Unfortunately, ThreatLocker will let you download something from the MS Store, sometime it will let you execute and sometimes it won't. I would like to see this to be able to block the download from MS Store until ThreatLocker approves the download.
Read full review Pros Fast and Unobtrusive, users hardly notice that Cylance is running on their computer, except when it detects something malicious User interface is simple for end users, and the management interface is streamlined and easy to get started with. The management interface has a quick tutorial that comes up upon first login that explains all the different aspects of how to configure CylanceProtect. Customer support is fantastic - in that if you get stuck or need help understanding a feature/setting, they are quick to respond and help to ensure that your configuration is set as optimal as possible for your scenarios. Read full review Application Control Privileged Access Management Storage access control Read full review Cons It would be great if there was a way for an administrator to make a file as safe from the end user device when a false positive has occurred (which is rare). At present and administrator has to log into the web console, create an exception and then wait 60-120 seconds for this to be effective on the end user device, still great, but this can be frustrating for users that are urgently trying to use the file. Executive reporting could be better. Just a single page dashboard report that could be included in other monthly reporting. Read full review Ease of moving between organizations Removing agents from clients who depart Some UNC path definitions for local files and folders Read full review Likelihood to Renew It's simply been the best product I've used and tested within the past four years.
Read full review ThreaLocker has done its job and has prevented malware from executing. It has stopped an encryption process once already. It has kept a user from going to a bad website. He tried twice and was wondering why he was getting an error message from ThreatLocker and ESET both.
Read full review Usability Great product Great technology Great people Great leader (Stuart McClure) Great Service I work with hundreds of complex suppliers in healthcare and tech, and this company is more than just an extension of our business.
Read full review ThreatLocker ease of use allows me to get the answers I need to any threats or denied action that ThreatLocker took. The "Unified Audit" is a great tool to show what is happening/executing on a user's computer or on a server. Unified Audit will allow to look at what steps a programs takes when it executes. It will show you if it calls on Powershell or what DLL's it is executing and many other things.
Read full review Reliability and Availability There is rarely ever an outage. I have seen slowness in ThreatLocker service. But that is very rare too!
Read full review Performance ThreatLocker is always available. The admin's console loads very fast and report runs almost instantly. It does not interfere with operating system.
Read full review Support Rating I have only used CylancePROTECT support one time and they were very fast and responsive with the answers that solved my issue. That is the only reason I gave them a 7 as I have only had one interaction with them.
Read full review You can email, call or do online chat with tech support. I love their online chat. They are quick and friendly. Also, if you need to show them something, you can give the chat technician permission from your Chat box to allow the tech access to your computer. They also can pull out your admin console on their side. They can look at your "Unified Audit" log and see the same thing that you can. They have a good KnowledgeBase that you can look for answers. They have what is called "ThreatLocker University" where you can go through tutorials and take tests.
Read full review In-Person Training The owners and co-founders work with you through Zoom Meetings. They walk you through how to use and setup ThreatLocker. They also have webinars. You also can go through ThreatLocker University online training.
Read full review Online Training Using ThreatLocker University online training is very easy and informative. You take online tests to see how well you learned the material. It is great!
Read full review Implementation Rating ThreatLocker is a family ran business. The owners, co-founders work with you to ensure you are up and running as quickly as possible. They went to ensure your success with ThreatLocker.
Read full review Alternatives Considered Cylance, I believe is the only one that uses the predict and prevent execution of advanced threats and malware at the endpoint. Cylance is by far a superior product.
Read full review I honestly have not seen many other programs like Threatlocker so I do not have any to compare to. Auto-Elevate may be the closest, however I did not evaluate them as part of my decision. Threatlocker does do a great job at onboarding which made deploying, setting up, and troubleshooting the program a breeze
Read full review Scalability ThreatLocker is very easy to add new ThreatLocker agents on computers and servers. It is very easy to do. You can install an agent on a computer or server in about 2 minutes or less.
Read full review Return on Investment We have the piece of mind that our endpoints are protected. We have more time to work on other projects as we don't have to worry about computers being on to have scheduled scans. Our computers CPU and RAM aren't going to be taken up with big process like typical anti-virus programs do. Read full review Too early on to tell, however, if ThreatLocker ends up blocking just one ransomware attack for any of our clients, I'd argue that it payed for itself. Read full review ScreenShots