ThreatLocker vs. Unisys Stealth
ThreatLocker vs. Unisys Stealth
Product | Rating | Most Used By | Product Summary | Starting Price |
---|---|---|---|---|
ThreatLocker | N/A | ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic. | N/A | |
Unisys Stealth | N/A | Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite providing zero trust network access, designed to protect the enterprise network, cloud services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation for advanced threat prevention. | N/A |
ThreatLocker | Unisys Stealth | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Editions & Modules | No answers on this topic | No answers on this topic | ||||||||||||||
Offerings |
| |||||||||||||||
Entry-level Setup Fee | No setup fee | No setup fee | ||||||||||||||
Additional Details | Contact vendor for pricing information. | — | ||||||||||||||
More Pricing Information |
ThreatLocker | Unisys Stealth | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Endpoint Security |
|
ThreatLocker | Unisys Stealth | |
---|---|---|
Small Businesses | SentinelOne Singularity Score 9.1 out of 10 | ThreatLocker Score 9.0 out of 10 |
Medium-sized Companies | SentinelOne Singularity Score 9.1 out of 10 | Palo Alto Networks Prisma Access Score 8.7 out of 10 |
Enterprises | BeyondTrust Endpoint Privilege Management Score 8.7 out of 10 | Palo Alto Networks Prisma Access Score 8.7 out of 10 |
All Alternatives | View all alternatives | View all alternatives |
ThreatLocker | Unisys Stealth | |
---|---|---|
Likelihood to Recommend | 8.7 (5 ratings) | - (0 ratings) |
Likelihood to Renew | 10.0 (1 ratings) | - (0 ratings) |
Usability | 10.0 (1 ratings) | - (0 ratings) |
Availability | 10.0 (1 ratings) | - (0 ratings) |
Performance | 10.0 (1 ratings) | - (0 ratings) |
Support Rating | 10.0 (1 ratings) | - (0 ratings) |
In-Person Training | 10.0 (1 ratings) | - (0 ratings) |
Online Training | 10.0 (1 ratings) | - (0 ratings) |
Implementation Rating | 10.0 (1 ratings) | - (0 ratings) |
Product Scalability | 10.0 (1 ratings) | - (0 ratings) |
Vendor post-sale | 10.0 (1 ratings) | - (0 ratings) |
Vendor pre-sale | 10.0 (1 ratings) | - (0 ratings) |
ThreatLocker | Unisys Stealth | |
---|---|---|
Likelihood to Recommend | ThreatLocker | Unisys No answers on this topic |
Pros | ThreatLocker | Unisys No answers on this topic |
Cons | ThreatLocker | Unisys No answers on this topic |
Likelihood to Renew | ThreatLocker | Unisys No answers on this topic |
Usability | ThreatLocker | Unisys No answers on this topic |
Reliability and Availability | ThreatLocker | Unisys No answers on this topic |
Performance | ThreatLocker | Unisys No answers on this topic |
Support Rating | ThreatLocker | Unisys No answers on this topic |
In-Person Training | ThreatLocker | Unisys No answers on this topic |
Online Training | ThreatLocker | Unisys No answers on this topic |
Implementation Rating | ThreatLocker | Unisys No answers on this topic |
Alternatives Considered | ThreatLocker | Unisys No answers on this topic |
Scalability | ThreatLocker | Unisys No answers on this topic |
Return on Investment | ThreatLocker | Unisys No answers on this topic |
ScreenShots | ThreatLocker Screenshots |