Elisity vs. ThreatLocker
Elisity vs. ThreatLocker
| Product | Rating | Most Used By | Product Summary | Starting Price |
|---|---|---|---|---|
Elisity | N/A | Elisity Cognitive Trust is a platform designed to enable enterprises to deliver least-privilege access from the cloud to any asset, enforcing policy and nano-segmentation at the edge. Cognitive trust is an approach to network access that enables secure connectivity at the asset level, based on contextual knowledge, over time. The platform continuously applies on-demand connections by verifying a combination of identity, location, permissions, and behavior. | N/A | |
ThreatLocker | N/A | ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic. | N/A |
| Elisity | ThreatLocker | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Editions & Modules | No answers on this topic | No answers on this topic | ||||||||||||||
| Offerings |
| |||||||||||||||
| Entry-level Setup Fee | No setup fee | No setup fee | ||||||||||||||
| Additional Details | — | Contact vendor for pricing information. | ||||||||||||||
| More Pricing Information | ||||||||||||||||
| Elisity | ThreatLocker | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Endpoint Security |
|
| Elisity | ThreatLocker | |
|---|---|---|
| Small Businesses | ThreatLocker Score 9.3 out of 10 | Acronis Cyber Protect Cloud Score 8.5 out of 10 |
| Medium-sized Companies | Palo Alto Networks Prisma Access Score 8.5 out of 10 | CrowdStrike Falcon Score 9.1 out of 10 |
| Enterprises | Palo Alto Networks Prisma Access Score 8.5 out of 10 | BeyondTrust Endpoint Privilege Management Score 10.0 out of 10 |
| All Alternatives | View all alternatives | View all alternatives |
| Elisity | ThreatLocker | |
|---|---|---|
| Likelihood to Recommend | - (0 ratings) | 9.7 (10 ratings) |
| Likelihood to Renew | - (0 ratings) | 10.0 (1 ratings) |
| Usability | - (0 ratings) | 8.7 (6 ratings) |
| Availability | - (0 ratings) | 10.0 (1 ratings) |
| Performance | - (0 ratings) | 10.0 (1 ratings) |
| Support Rating | - (0 ratings) | 10.0 (1 ratings) |
| In-Person Training | - (0 ratings) | 10.0 (1 ratings) |
| Online Training | - (0 ratings) | 10.0 (1 ratings) |
| Implementation Rating | - (0 ratings) | 10.0 (1 ratings) |
| Product Scalability | - (0 ratings) | 10.0 (1 ratings) |
| Vendor post-sale | - (0 ratings) | 10.0 (1 ratings) |
| Vendor pre-sale | - (0 ratings) | 10.0 (1 ratings) |
| Elisity | ThreatLocker | |
|---|---|---|
| Likelihood to Recommend | ![]() Elisity No answers on this topic | ThreatLocker
|
| Pros | ![]() Elisity No answers on this topic | ThreatLocker
|
| Cons | ![]() Elisity No answers on this topic | ThreatLocker
|
| Likelihood to Renew | ![]() Elisity No answers on this topic | ThreatLocker
|
| Usability | ![]() Elisity No answers on this topic | ThreatLocker
|
| Reliability and Availability | ![]() Elisity No answers on this topic | ThreatLocker
|
| Performance | ![]() Elisity No answers on this topic | ThreatLocker
|
| Support Rating | ![]() Elisity No answers on this topic | ThreatLocker
|
| In-Person Training | ![]() Elisity No answers on this topic | ThreatLocker
|
| Online Training | ![]() Elisity No answers on this topic | ThreatLocker
|
| Implementation Rating | ![]() Elisity No answers on this topic | ThreatLocker
|
| Alternatives Considered | ![]() Elisity No answers on this topic | ThreatLocker
|
| Scalability | ![]() Elisity No answers on this topic | ThreatLocker
|
| Return on Investment | ![]() Elisity No answers on this topic | ThreatLocker
|
| ScreenShots | ThreatLocker Screenshots |


