Overview
What is ThreatLocker?
ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic.
TrustRadius Insights
ThreatLocker is the only practical and affordable zero trust solution for small businesses
ThreatLocker will stifle any unknown/known threats
Threatlocker is necessary in a zero trust world
Easy to Deploy, Fast Support
Reviewer Pros & Cons
Pricing
What is ThreatLocker?
ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic.
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
127 people also want pricing
Alternatives Pricing
What is CrowdStrike Falcon?
CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no…
What is Webroot Antivirus + Internet Security Complete (SecureAnywhere)?
Webroot Security Complete (formerly under the brand name SecureAnywhere) is a suite of antivirus, multi-endpoint security and Internet security solutions available for home offices, and possibly small businesses with limited security needs.
Product Demos
Threatlocker Powerlunch
ThreatLocker Control (™) Demo Part 4
ITBOG Livestream Demo - ThreatLocker
Threatlocker | Live Demo
ThreatLocker Control (™) Demo Part 3
ITBOG Livestream Demo - ThreatLocker
Product Details
- About
- Competitors
- Tech Details
- FAQs
What is ThreatLocker?
Additional capabilities include:
"Allowlisting" controls what software, scripts, executables, and libraries can run on endpoints and servers. This approach not only stops malicious software, but it also stops other unpermitted applications from running.
ThreatLocker Screenshots
ThreatLocker Videos
ThreatLocker Competitors
ThreatLocker Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Unspecified |
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(16)Community Insights
- Business Problems Solved
- Pros
- Cons
- Recommendations
ThreatLocker offers a range of use cases that have proven valuable for organizations seeking to enhance their cybersecurity. Users have found practical applications for ThreatLocker, including DNS white listing, preventing accidental installs, and blocking external data sources. By providing better control and protection of client systems, ThreatLocker effectively stops the installation of unnecessary applications and software. One key benefit users appreciate is that ThreatLocker acts as a learning tool, preventing team members from making mistakes and ensuring the safety of their computers. Another important problem solved by ThreatLocker is its ability to detect malicious applications that may be missed by traditional anti-virus software, thereby delivering a higher level of security for clients. The software also effectively prevents ransomware attacks and safeguards systems from malware. In addition to these features, ThreatLocker helps organizations achieve NIST compliance and mitigates risks associated with rogue and malicious applications like ransomware. The product's file tracking and auditing capabilities are particularly valuable in eliminating ransomware threats and providing insights into system activity. Overall, ThreatLocker addresses various cybersecurity issues such as unauthorized application access and potential malware attacks through its application control and Zero Trust model. It simplifies the process of controlling applications on endpoints, removing the need for extensive investigations. Users can confidently offer and support zero-trust security to their clients with the help of ThreatLocker, enabling them to implement zero-trust in an easy and cost-efficient manner. By allowing users to control which applications run and what data/actions are permitted, ThreatLocker empowers organizations with complete control over the environments they manage while bolstering endpoint security beyond traditional Anti-Virus solutions.
Comprehensive and Proactive Platform: Users find ThreatLocker to be a comprehensive and proactive platform for application control and security. They appreciate the ease of deployment and intuitive interface, which empower them to effectively manage numerous endpoints. Some users have seen firsthand how the ThreatLocker team continuously improves the product, streamlining performance and enhancing the user experience.
Zero Trust Implementation: The Zero Trust implementation in ThreatLocker is highly valued by users, as it allows them to examine every single file and restrict them to the desired level of security. This feature provides peace of mind and restricts end users from performing unauthorized actions. Some users appreciate that ThreatLocker has made Zero Trust accessible to all businesses, regardless of size.
Ease of Use and Deployment: Users appreciate how easy it is to deploy ThreatLocker within their organizations. They find it very easy to use, with an intuitive interface that simplifies the management of allow lists. The learning mode eliminates the need for manual file hash collection, making whitelisting painless. Additionally, some users value ThreatLocker's support team for being helpful in addressing concerns and providing assistance during onboarding.
Learning Curve: Some users have mentioned that there is a learning curve involved during the initial setup of ThreatLocker. However, they acknowledge that any difficulties were quickly overshadowed by the advantages in terms of security, control, and peace of mind.
Interface Takes Getting Used To: Users have reported that the interface of ThreatLocker takes a little getting used to. While this may initially be a challenge for some, it does not detract from the overall benefits provided by the software.
Disruption without Best Practices: Some users have noted that if ThreatLocker is not deployed with best practices, it can be somewhat disruptive to users. However, these disruptions can be mitigated by ensuring proper implementation and configuration.
Users have made several recommendations for Threatlocker based on their experiences. One recommendation is to implement Threatlocker for companies with a security-first mindset, as it is seen as a game-changer and a differentiator in the market. Another recommendation is to use Threatlocker as a supplement to existing antivirus software, emphasizing the need for a multi-layer security approach instead of relying solely on antivirus software. Users also advise using Threatlocker alongside other security products such as EDR, SIEM, and MDR to enhance overall security measures. Additionally, users suggest testing Threatlocker internally before rolling it out to customers.
Attribute Ratings
Reviews
(1-5 of 5)ThreatLocker Experience
- New portal much cleaner.
- Onboarding process very hands on.
- Requesting process is easy to navigate.
- Unused polices are nearly impossible to navigate due to no sorts or filtering options.
- Redundant polices are impossible to determine.
- Cannot view literally all policies for one organization in one view/list. Instead of have to check policies per device, group, or all machines.
- Anti-Exploit Technology
- 100%10.0
- Endpoint Detection and Response (EDR)
- 80%8.0
- Centralized Management
- 80%8.0
- Hybrid Deployment Support
- 100%10.0
- Infection Remediation
- 100%10.0
- Vulnerability Management
- 70%7.0
- Malware Detection
- 100%10.0
- Too early on to tell, however, if ThreatLocker ends up blocking just one ransomware attack for any of our clients, I'd argue that it payed for itself.
ThreatLocker is the only practical and affordable zero trust solution for small businesses
We use ThreatLocker to provide a higher level of security for our clients while reducing the risks of attacks and breaches. The platform's ability to control access to critical systems and data, along with its automated threat detection and response capabilities, meets our need to secure multiple clients with diverse IT environments.
- Application Control
- Privileged Access Management
- Storage access control
- There is still room for improvement with the interface
- Reporting functionality could be improved
- Better notification to users
- Practical to implement and use
- Affordable
- All-in-one zero trust solution
- Anti-Exploit Technology
- 90%9.0
- Endpoint Detection and Response (EDR)
- 80%8.0
- Centralized Management
- 90%9.0
- Infection Remediation
- 70%7.0
- Vulnerability Management
- 70%7.0
- Malware Detection
- 90%9.0
- Allowed us to deliver zero-trust at an affordable cost
- Can be managed with existing skillset
- Most cost effective application control for small businesses
ThreatLocker will stifle any unknown/known threats
ThreatLocker has an audit feature, so you can see what ThreatLocker has "denied", so you can look to see if it is a good or bad file. Maybe a software was trying to do an update and it was denied since it wasn't whitelisted for automatic approval. For example, Microsoft path Tuesday's patches.
ThreatLocker has paid for itself already. There have been a few times when a user has opened an attachment that had malware in it. ThreatLocker stopped it from executing.
- Stop users from installing software
- Stopped malware in a file attachment
- Stopped any unknown software or update from executing
- You can give a user "elevate" mode for a one time software installation if necessary
- Push out ThreatLocker updates without having to reboot computer
- When running the Unified Audit, I like to use certain filters. I wish there as a way to save those filters, so I don't have to select them every time I do a Unified Audit.
ThreatLocker came with many prebuilt template for common software and utilities, like Office365, putty, Firefox, Google, etc. It came with a bunch of prebuilt blocking/ringfencing rules for utilities like powershell, hyper-v psexec, and many others. This saves setup time.
Unfortunately, ThreatLocker will let you download something from the MS Store, sometime it will let you execute and sometimes it won't. I would like to see this to be able to block the download from MS Store until ThreatLocker approves the download.
- Stopping the executable from a file attachment, whether it was downloaded or opened from an attachment.
- Keep users from running/installing updates from an application. They can ask/request for the updates to be ranned, if necessary.
- The "blocked items" option from the ThreatLocker icon in the system tray. There are times when something is not working right. You can see if ThreatLocker is blocking something from the ThreatLocker icon in the system tray.
- Anti-Exploit Technology
- 100%10.0
- Endpoint Detection and Response (EDR)
- 100%10.0
- Centralized Management
- 100%10.0
- Hybrid Deployment Support
- N/AN/A
- Infection Remediation
- 80%8.0
- Vulnerability Management
- 80%8.0
- Malware Detection
- 100%10.0
- I believe that ThreatLocker has prevented us from getting ransomware. I have it set up to block the use of any encryption tools.
- I know on multiple occasion, ThreatLocker has blocked malware from executing.
- It has kept users from installing Shareware software. I have a couple of users who like to use Shareware software.
- It keeps users honest to comply with our Corporate's cybersecurity policies.
- It keeps us compliant with software licensing.
WhiteCloud Security is too complicated to use and setup.
AppLocker and MalwareByte don't have hardly any features.
- To stop unknown/known malware from executing.
- To stop the download of any unauthorized software to your computer or server.
- To stop any unauthorized encrypting process.
- Don't allow software to execute from a network share.
- To explicitly disallow any encryption process to run.
- To explicitly disallow any type of disk wiper process to run.
- To setup Network Access Control.
- Scalability
- Ease of Use
- Third-party professional services
Afterward, if you still have questions or issues. You can email, call or using the Chat box in the admin's console.
You can also use the ThreatLocker University online training.
ThreatLocker does not leave you hanging.
- Understanding what "ringfencing" is and what it does.
- Online Training
- In-Person Training
You also can go through ThreatLocker University online training.
They also can pull out your admin console on their side. They can look at your "Unified Audit" log and see the same thing that you can.
They have a good KnowledgeBase that you can look for answers.
They have what is called "ThreatLocker University" where you can go through tutorials and take tests.
Small program installation I would just copy over the local machine. But this software was like gigabytes. We were able to tell ThreatLocker that only the admin user could install this program from a certain network share path.
It made an admin's life a whole lot easier.
- To whitelist an application.
- To allow 'denied' updates to run.
- To use the "Unified Audit".
- To push ThreatLocker updates out to all computers and servers.
- To put a computer into "Installation" mode.
- To install a prebuild application rule.
- Working with Network Access Control, as that is not my area of expertise.
- ThreatLocker is always enhancing or adding new features or fixing any bugs.
- They take user's suggestion and feedback. Then implement them. I asked for a certain report and they added it to the reports list.
- ThreatLocker is always trying to find ways to improve processing speed.
- I am hoping they decrease the agent footprint size. I noticed that the executable has increased in size.
Threatlocker is necessary in a zero trust world
- Zero trust
- Protecting end users
- Management of programs
- Portal design
- Management selections
- Ease of use for technicians
- Zero trust protection
- Multi site management
- Reporting
- Anti-Exploit Technology
- 90%9.0
- Endpoint Detection and Response (EDR)
- 90%9.0
- Centralized Management
- 80%8.0
- Hybrid Deployment Support
- N/AN/A
- Infection Remediation
- 100%10.0
- Vulnerability Management
- 100%10.0
- Malware Detection
- 80%8.0
- We feel the cost benefit is amazing
- Safety is 100% worth it
- Peace of mind
Easy to Deploy, Fast Support
- Onboarding and training
- Ease of getting hold of support
- Ease of deployment
- Reporting
- Ease of moving between organizations
- Removing agents from clients who depart
- Some UNC path definitions for local files and folders
- Ease of deployment
- Ease of reporting
- Ease of support
- Allowed us to keep up with client expectations for security
- Allowed us to report on software installations for compliance
- Allowed us to quickly scan for vulnerabilities