TrustRadius: an HG Insights company
ThreatLocker Logo

ThreatLocker Reviews and Ratings

Rating: 9.4 out of 10
Score
9.4 out of 10

Community insights

TrustRadius Insights for ThreatLocker are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.

Pros

Comprehensive and Proactive Platform: Users find ThreatLocker to be a comprehensive and proactive platform for application control and security. They appreciate the ease of deployment and intuitive interface, which empower them to effectively manage numerous endpoints. Some users have seen firsthand how the ThreatLocker team continuously improves the product, streamlining performance and enhancing the user experience.

Zero Trust Implementation: The Zero Trust implementation in ThreatLocker is highly valued by users, as it allows them to examine every single file and restrict them to the desired level of security. This feature provides peace of mind and restricts end users from performing unauthorized actions. Some users appreciate that ThreatLocker has made Zero Trust accessible to all businesses, regardless of size.

Ease of Use and Deployment: Users appreciate how easy it is to deploy ThreatLocker within their organizations. They find it very easy to use, with an intuitive interface that simplifies the management of allow lists. The learning mode eliminates the need for manual file hash collection, making whitelisting painless. Additionally, some users value ThreatLocker's support team for being helpful in addressing concerns and providing assistance during onboarding.

Reviews

10 Reviews

Threatlocker review.

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We use Threatlocker to analyze the most frequently used programs by users and block any unauthorized programs for more automated control and security. It is a good way for us not to have to worry about any unknown software in our client environments and shows that we are actively monitoring such things.

Pros

  • Support is fast and responsive.
  • Very good at its intended purpose.
  • Testing environment is very useful.

Cons

  • Some programs that are known come up as blocked time to time.
  • It has a difficult time recognizing safe driver installations.
  • The different modes can be expanded on.

Likelihood to Recommend

Threatlocker does exactly as it advertises. I would recommend it to anyone seeking a comprehensive solution for managing software approvals. It is also very easy to use with an online support team, or Cyberheros, as they call it, that is very quick and responsive. The preset programs are also a nice touch, making deployment easy.

Vetted Review
ThreatLocker
2 years of experience

ThreatLocker - Peace of Mind

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

We use ThreatLocker setup to provide Application control, Storage control and Elevation Control. App control allows to prevent the execution of non-approved applications. Storage control provides the ability to require that only encrypted USB devices are used unless otherwise allowed. Elevation control lets us dictate which applications can be run as administrator meaning we no longer have to allow a given user to have local admin rights.

Pros

  • Application Control
  • Elevation Control
  • Storage Control

Cons

  • None
  • None
  • None

Likelihood to Recommend

Prior to ThreatLocker, users would download and install just about any software they were able to access, despite policy. With ThreatLocker, any application that attempts to execute requires approval by a ThreatLocker admin. The use of Elevation control eliminated the need to allow users to be local administrators on their PC because they had an app that "had" to run as admin.

Vetted Review
ThreatLocker
5 years of experience

ThreatLocker the Zero Trust system you didn't know you needed.

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

ThreatLocker is used on every endpoint and server in our business. The software's functionality allows us to apply a zero-trust principle to all areas of our internal systems. We use the software to block any applications outside of the scope of our pre-approved applications. Further, we use network control to block client-to-client or client-to-server connections on unnecessary protocols. We also use the config manager to apply policies into our environment that we would have traditionally had to build manually in group policy, allowing us to roll out policies company-wide or to specific groups. Anything that tries to breach these policies immediately alerts us, and as such, we can understand what is going on behind the scenes on our network and what users are trying to run versus what they are allowed to run. The picture this paints is invaluable for our confidence in a smooth operation.

Pros

  • Application whitelisting.
  • Unified audits of everything network & application.
  • Clean and concise portal to manage the same.
  • Dynamic ability to allow users to request more apps.
  • Security and a sense of complete control.

Cons

  • I don't honestly know of any areas they could improve.

Likelihood to Recommend

If you want to know what is running in your environment and what it is trying to access, you should be able to take preemptive measures to prevent and protect yourself from it. ThreatLocker is the system for you! It will replace almost any EDR requirement, although I recommend you partner it with Windows Defender.

Vetted Review
ThreatLocker
4 years of experience

ThreatLocker is an essential application to our Cyber Security Stack

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

We use ThreatLocker to allow us to deploy application control and network hardening. especially for backup hosts. we use it to comply with essential 8. Without it we would greatly struggle, and ThreatLocker has made its really easy to achieve the required maturity level the client requires.

Pros

  • Application Control
  • Network Storage lockdown
  • Auditing

Cons

  • Reporting
  • easier UI

Likelihood to Recommend

Clients needing essential 8. ThreatLocker tickets the application control requirements and also has inbuild policies that is just a couple clicks to enable. super easy to deploy and then comly with essential 8.

Vetted Review
ThreatLocker
2 years of experience

ThreatLocker a must have in your Security Stack!

Rating: 10 out of 10

Use Cases and Deployment Scope

We are an MSSP that needed an Application Control tool for a good price since we offer this tool to all size companies. This tool met our requirements both on price and on function of what it offers. It provides a solid replacement for UAC and provided a way to limit what users install on their devices.

Pros

  • Vendor Support is top notch. Quick response times and incredibly easy to talk to.
  • Application Control when tuned properly works exactly as you would expect. Giving your Internal IT and MSPs complete control over what is allowed in the environment.
  • Easy Deployment with an RMM via their stub installers
  • Integration with most PSA systems allowing automatic ticket closures when the CyberHeros work something before your team can get to it. (~5 mins)

Cons

  • Customization of the Tray and Pop ups
  • More control for the Cyber Heros for Apps that are approved
  • NA

Likelihood to Recommend

Best suited for all types of companies that have employees. You never know what kinds of things people will click (even on accident) which can try to install unwanted applications onto your devices.

I can't really think of a company that wouldn't want to run this tool since it's so game changing when it comes to endpoint security and the cost of the tool being significantly lower than most standard EDRs out there with the added benefit of Application control.

ThreatLocker Experience

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

By helping to implementate Zero-trust architecture. Currently working to roll out to all clients.

Pros

  • New portal much cleaner.
  • Onboarding process very hands on.
  • Requesting process is easy to navigate.

Cons

  • Unused polices are nearly impossible to navigate due to no sorts or filtering options.
  • Redundant polices are impossible to determine.
  • Cannot view literally all policies for one organization in one view/list. Instead of have to check policies per device, group, or all machines.

Likelihood to Recommend

Any organization taking security and zero trust seriously. However, if an organization does not have the manpower/care to carefully build and maintain a true Zero Trust environment, than it's not for them.

Vetted Review
ThreatLocker
1 year of experience

ThreatLocker is the only practical and affordable zero trust solution for small businesses

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

We needed a practical and affordable zero trust

solution, and ThreatLocker was the only one that could deliver. ThreatLocker

provides us with an all-in-one zero trust solution - Application Control,

Privileged Access Management (PAM) and storage access control.

We use ThreatLocker to provide a higher level of security for our clients while reducing the risks of attacks and breaches. The platform's ability to control access to critical systems and data, along with its automated threat detection and response capabilities, meets our need to secure multiple clients with diverse IT environments.

Pros

  • Application Control
  • Privileged Access Management
  • Storage access control

Cons

  • There is still room for improvement with the interface
  • Reporting functionality could be improved
  • Better notification to users

Likelihood to Recommend

ThreatLocker's automated threat detection and response capabilities provide

an extra layer of security for our law firm clients, reducing the

risk of malware infections and data breaches. With ThreatLocker's

centralized management, we can easily configure and monitor the

security settings across all endpoints and provide timely support and

remediation when necessary.

ThreatLocker will stifle any unknown/known threats

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

This is a deny all process until approval is given (whitelisting) process. It has many nice features for approving software to allow it to execute. ThreatLocker has a "learning" mode, "installation" mode, and "elevation" mode. Users can request access to download new software. Admin can either approve or deny it. If denied, they can send a reason why it was denied.

ThreatLocker has an audit feature, so you can see what ThreatLocker has "denied", so you can look to see if it is a good or bad file. Maybe a software was trying to do an update and it was denied since it wasn't whitelisted for automatic approval. For example, Microsoft path Tuesday's patches.

ThreatLocker has paid for itself already. There have been a few times when a user has opened an attachment that had malware in it. ThreatLocker stopped it from executing.

Pros

  • Stop users from installing software
  • Stopped malware in a file attachment
  • Stopped any unknown software or update from executing
  • You can give a user "elevate" mode for a one time software installation if necessary
  • Push out ThreatLocker updates without having to reboot computer

Cons

  • When running the Unified Audit, I like to use certain filters. I wish there as a way to save those filters, so I don't have to select them every time I do a Unified Audit.

Likelihood to Recommend

I have tested two of software besides ThreatLocker. ThreatLocker by far, was the easiest of the 3 to work with and setup. One of the companies' software was too complicated to run and setup. The other one lacked a lot of the features that ThreatLocker had.

ThreatLocker came with many prebuilt template for common software and utilities, like Office365, putty, Firefox, Google, etc. It came with a bunch of prebuilt blocking/ringfencing rules for utilities like powershell, hyper-v psexec, and many others. This saves setup time.

Unfortunately, ThreatLocker will let you download something from the MS Store, sometime it will let you execute and sometimes it won't. I would like to see this to be able to block the download from MS Store until ThreatLocker approves the download.

Threatlocker is necessary in a zero trust world

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We use Threat Locker as a zero trust solution to protect the end users we manage. We trained on the use of the software and utilize the learning mode before go live. We use this project across all cyber security customer computers. This solves the problem of unwanted or unknown programs being used and compromising the network.

Pros

  • Zero trust
  • Protecting end users
  • Management of programs

Cons

  • Portal design
  • Management selections
  • Ease of use for technicians

Likelihood to Recommend

Threatlocker is suited to all scenarios of end user workstation management. We protect users in medical, legal, and engineering fields who often have to use multiple programs that update frequently. It is less suited for use for IT firms whose users are more tech savvy. Honestly everyone should use it ideally

Easy to Deploy, Fast Support

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We use ThreatLocker to lock down client machines specifically for applications and adding USB devices. It allows us to easily generate reports that show what applications are allowed and which are blocked for compliance purposes. It can also assist with installing allowed applications by allowing automatic admin rights. You can also involve the user's manager for approvals of programs and USB devices.

Pros

  • Onboarding and training
  • Ease of getting hold of support
  • Ease of deployment
  • Reporting

Cons

  • Ease of moving between organizations
  • Removing agents from clients who depart
  • Some UNC path definitions for local files and folders

Likelihood to Recommend

If a client has concerns with numerous employees installing things they shouldn't, if worried about employees adding programs to exfiltrate data, worries about the current Cybersecurity stack allowing scripting and therefore a vector for compromise, worries about fileless malware. Ability to quickly report on what applications are allowed in an organization.