Kensington Device Security vs. ThreatLocker
Kensington Device Security vs. ThreatLocker
| Product | Rating | Most Used By | Product Summary | Starting Price |
|---|---|---|---|---|
Kensington Device Security | N/A | Kensington headquartered in San Mateo offers a suite of endpoint protection products, such as laptop and desktop locking stations, surface locks and travel locks, lock anchor points, and other tools to secure enterprise endpoints from theft or absconsion. | N/A | |
ThreatLocker | N/A | ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic. | N/A |
| Kensington Device Security | ThreatLocker | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Editions & Modules | No answers on this topic | No answers on this topic | ||||||||||||||
| Offerings |
| |||||||||||||||
| Entry-level Setup Fee | No setup fee | No setup fee | ||||||||||||||
| Additional Details | — | Contact vendor for pricing information. | ||||||||||||||
| More Pricing Information | ||||||||||||||||
| Kensington Device Security | ThreatLocker | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Endpoint Security |
|
| Kensington Device Security | ThreatLocker | |
|---|---|---|
| Small Businesses | ThreatLocker Score 9.4 out of 10 | ![]() Malwarebytes Score 8.8 out of 10 |
| Medium-sized Companies | CrowdStrike Falcon Score 9.1 out of 10 | CrowdStrike Falcon Score 9.1 out of 10 |
| Enterprises | BeyondTrust Endpoint Privilege Management Score 10.0 out of 10 | BeyondTrust Endpoint Privilege Management Score 10.0 out of 10 |
| All Alternatives | View all alternatives | View all alternatives |
| Kensington Device Security | ThreatLocker | |
|---|---|---|
| Likelihood to Recommend | - (0 ratings) | 9.7 (10 ratings) |
| Likelihood to Renew | - (0 ratings) | 10.0 (1 ratings) |
| Usability | - (0 ratings) | 8.7 (6 ratings) |
| Availability | - (0 ratings) | 10.0 (1 ratings) |
| Performance | - (0 ratings) | 10.0 (1 ratings) |
| Support Rating | - (0 ratings) | 10.0 (1 ratings) |
| In-Person Training | - (0 ratings) | 10.0 (1 ratings) |
| Online Training | - (0 ratings) | 10.0 (1 ratings) |
| Implementation Rating | - (0 ratings) | 10.0 (1 ratings) |
| Product Scalability | - (0 ratings) | 10.0 (1 ratings) |
| Vendor post-sale | - (0 ratings) | 10.0 (1 ratings) |
| Vendor pre-sale | - (0 ratings) | 10.0 (1 ratings) |
| Kensington Device Security | ThreatLocker | |
|---|---|---|
| Likelihood to Recommend | ![]() Kensington No answers on this topic | ThreatLocker
|
| Pros | ![]() Kensington No answers on this topic | ThreatLocker
|
| Cons | ![]() Kensington No answers on this topic | ThreatLocker
|
| Likelihood to Renew | ![]() Kensington No answers on this topic | ThreatLocker
|
| Usability | ![]() Kensington No answers on this topic | ThreatLocker
|
| Reliability and Availability | ![]() Kensington No answers on this topic | ThreatLocker
|
| Performance | ![]() Kensington No answers on this topic | ThreatLocker
|
| Support Rating | ![]() Kensington No answers on this topic | ThreatLocker
|
| In-Person Training | ![]() Kensington No answers on this topic | ThreatLocker
|
| Online Training | ![]() Kensington No answers on this topic | ThreatLocker
|
| Implementation Rating | ![]() Kensington No answers on this topic | ThreatLocker
|
| Alternatives Considered | ![]() Kensington No answers on this topic | ThreatLocker
|
| Scalability | ![]() Kensington No answers on this topic | ThreatLocker
|
| Return on Investment | ![]() Kensington No answers on this topic | ThreatLocker
|
| ScreenShots | ThreatLocker Screenshots |



