TrustRadius: an HG Insights company

ThreatLocker Reviews & Insights

Score9.2 out of 10

30 Reviews and Ratings

Top industries

Based on 162 HG Insights installations.

Community Insights for ThreatLocker

Synthesised from 5 verified reviews.


Synthesised from 5 reviews


ThreatLocker is primarily adopted by organizations to implement robust application control and enforce zero-trust security principles across their internal systems. This capability is highlighted as a critical tool for preventing unauthorized software execution and limiting what users can install on their devices, effectively replacing traditional User Account Control (UAC). Reviewers apply it to secure various environments, including critical infrastructure like backup hosts. The product's core strength lies in its robust application control, with 80% of reviewers commending its comprehensive oversight of computing environments. This directly contributes to enhanced security, as 60% of reviewers cite its ability to block unwanted applications and prevent security breaches, including ransomware attacks. Furthermore, 40% of reviewers appreciate the platform's unified auditing features and clean management portal, which contribute to a positive user experience. Beyond foundational security, ThreatLocker extends its utility to streamlined policy management and security monitoring, with 40% of reviewers leveraging these features for deploying company-wide configurations and receiving immediate notifications on policy breaches. The vendor's support is also a notable asset, with 40% of reviewers praising the responsiveness and helpfulness of the support team. ThreatLocker delivers a positive return on investment by significantly improving an organization's overall security posture, a benefit highlighted by 40% of reviewers. The platform also helps streamline IT operations by reducing the administrative burden on technical staff, as noted by 40% of reviewers, thereby optimizing resource allocation within IT departments. The provided reviewer feedback does not explicitly detail significant weaknesses or negative impacts, suggesting a generally positive reception among the reviewed user base.


  • Robust application control and zero-trust enforcement
  • Responsive and helpful vendor support
  • Comprehensive auditing features and clean management portal
  • Effective in blocking unwanted applications and preventing breaches
  • Reduced administrative burden and operational overhead
  • No significant weaknesses were explicitly identified in the provided reviewer feedback
What positive or negative impact (i.e. Return on Investment or ROI) has ThreatLocker had on your overall business objectives?

From 5 reviews

Reviewers indicate that ThreatLocker positively impacts business objectives primarily through enhanced security and reduced operational overhead. A key benefit, cited by 3 of 5 reviewers, is the tool's ability to block unwanted applications, which directly contributes to preventing security breaches and ransomware attacks. This proactive defense mechanism is seen as a significant improvement to an organization's overall security posture, a point highlighted by 2 of 5 reviewers. Furthermore, the platform helps streamline IT operations by reducing the administrative burden on technical staff, as noted by 2 of 5 reviewers. These combined effects suggest a positive return on investment by mitigating potential financial losses from cyberattacks and optimizing resource allocation within IT departments.

Blocks unwanted applications

ThreatLocker has significantly increased our security posture by blocking execution of unwanted software.

Reduces administrative burden

Saves hours of technician time.

Increases security posture

ThreatLocker has significantly increased our security posture by blocking execution of unwanted software.

Describe how you use ThreatLocker in your organization. What are the business problems the product addresses and what is the scope of your use case?

From 5 reviews

ThreatLocker is primarily utilized by organizations to implement robust application control and enforce zero-trust security principles across their internal systems. All five reviewers indicated that the product serves as a critical tool for preventing the execution of unauthorized software and limiting what users can install on their devices. This capability is highlighted as a solid replacement for traditional User Account Control (UAC) and is applied to secure various environments, including backup hosts. Beyond application control, two of five reviewers also leverage ThreatLocker for streamlined policy management, enabling the deployment of company-wide or group-specific configurations without manual group policy creation. Furthermore, two reviewers noted the product's effectiveness in security monitoring and alerting, providing immediate notifications when policy breaches occur, thereby offering visibility into network activities and user attempts to run unapproved applications.

Application Control

We use ThreatLocker setup to provide Application control, Storage control and Elevation Control. App control allows to prevent the execution of non-approved applications.

Policy Management

We also use the config manager to apply policies into our environment that we would have traditionally had to build manually in group policy, allowing us to roll out policies company-wide or to specific groups.

Security Monitoring and Alerting

shows that we are actively monitoring such things.

Please provide some detailed examples of things that ThreatLocker does particularly well.

From 5 reviews

ThreatLocker is primarily recognized for its robust application control capabilities, which were highlighted by 4 of 5 reviewers. This core functionality is seen as providing organizations with comprehensive oversight of their computing environments. Beyond its primary security features, reviewers also frequently noted the quality of vendor support and the utility of the platform's auditing features. Two of five reviewers specifically praised the responsiveness and helpfulness of the support team. Similarly, the platform's ability to provide unified audits across networks and applications, along with its clean management portal, contributed to a positive user experience for 40% of the reviewers. These aspects collectively suggest that the product is valued for both its foundational security mechanisms and the operational ease it provides.

Application Control

Application Control

Vendor Support

Vendor Support is top notch. Quick response times and incredibly easy to talk to.

Unified Audits

Auditing

Loading Reviews List....