ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic.
N/A
Trend Micro Worry-Free Services Suite
Score 9.0 out of 10
N/A
Trend Micro offers an end-to-end hosted security solution which they call the Worry-Free Business Security suite for midsize and larger enterprises, which provides a wide range of services such as endpoint protection, email encryption, general antivirus and threat detection and prevention, as well as protection of cloud applications as well, with no maintenance.
N/A
Pricing
ThreatLocker
Trend Micro Worry-Free Services Suite
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
ThreatLocker
Trend Micro Worry-Free Services Suite
Free Trial
Yes
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Contact vendor for pricing information.
—
More Pricing Information
Community Pulse
ThreatLocker
Trend Micro Worry-Free Services Suite
Features
ThreatLocker
Trend Micro Worry-Free Services Suite
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Threatlocker does exactly as it advertises. I would recommend it to anyone seeking a comprehensive solution for managing software approvals. It is also very easy to use with an online support team, or Cyberheros, as they call it, that is very quick and responsive. The preset programs are also a nice touch, making deployment easy.
With around 80 users and 150 devices (including 6 server instances), this solution served us very well, with instant admin notifications and scheduled overall reports. Detection appears extremely reliable, and the memory and CPU footprint of the service seemed less intrusive than Panda, which we had issues running on Terminal Services instances, as it seems to hog excessive memory allocation. Rollout was smooth and we never had an instance of a corrupt installation.
When running the Unified Audit, I like to use certain filters. I wish there as a way to save those filters, so I don't have to select them every time I do a Unified Audit.
It would be better if there were an unload password for each policy instead of one for the whole organization.
We have one app that gets blocked with no log of any reason why, there should be a better way to troubleshoot that other than just closing the AV every time. Allow listing has not worked in this case.
When something is blocked it should specify exactly which setting or feature blocked it to make it easier to use the allow list or adjust.
ThreaLocker has done its job and has prevented malware from executing. It has stopped an encryption process once already. It has kept a user from going to a bad website. He tried twice and was wondering why he was getting an error message from ThreatLocker and ESET both.
Technician and Analyst alike will love this tool as long as they learn to use it. They have fantastic study material that breaks everything down on it where to find settings and how to best manage the tool. End users are the only complaints we get only because they sometimes don't understand that installing a PDF convertor that is labeled as Free on the internet isn't always in their best interest.
Installation and administration tools are fantastic. I found the endpoint policies to be not intuitive and clunky. The endpoint client was difficult to disable when trying to troubleshoot Apple issues and I often had to uninstall and then reinstall which was very time-consuming. Reporting is very useful and I was impressed with the reports I received.
You can email, call or do online chat with tech support. I love their online chat. They are quick and friendly. Also, if you need to show them something, you can give the chat technician permission from your Chat box to allow the tech access to your computer. They also can pull out your admin console on their side. They can look at your "Unified Audit" log and see the same thing that you can. They have a good KnowledgeBase that you can look for answers. They have what is called "ThreatLocker University" where you can go through tutorials and take tests.
The few times I needed to contact support I was fully satisfied. They worked all the way through the issue, no matter how long it took, and made sure I had a permanent solution. I was pleased with the professionalism, courteousness, and knowledge of the product they were supporting.
The owners and co-founders work with you through Zoom Meetings. They walk you through how to use and setup ThreatLocker. They also have webinars. You also can go through ThreatLocker University online training.
Using ThreatLocker University online training is very easy and informative. You take online tests to see how well you learned the material. It is great!
ThreatLocker is a family ran business. The owners, co-founders work with you to ensure you are up and running as quickly as possible. They went to ensure your success with ThreatLocker.
Prior to buying ThreatLocker, we evaluated Tanium's whitelisting module. We felt that ThreatLocker's method of baselining existing applications and comparing them to known IoC's made for an easier implementation. To be fair, this was solely based on demonstrations by each vendor and not by actual PoC's. The implementation for ThreatLocker went smoothly and we have very few issues with the product that require support intervention. When support is needed, it is readily available via chat.
Avast was clunky, difficult to roll out, missed loads of malware on machines, and required that we purchase a separate license to install AV on our servers. Trend Micro could not have been any different. You just contact their sales department and get a demo, or even ask for a trial of sorts to test policy creations and client installation. You'll be obsessed with the whole process and the admin dashboard you have access to.
ThreatLocker is very easy to add new ThreatLocker agents on computers and servers. It is very easy to do. You can install an agent on a computer or server in about 2 minutes or less.