ThreatLocker Product Guide

ThreatLocker Product Guide

Thinking about purchasing ThreatLocker? Check out our in-depth guide, synthesized from authentic user reviews. We’ve summarized users’ thoughts about how well ThreatLocker works for them.

Highlight the Right Reviews

Throughout the guide below, there are links directly to reviews. Select the reviewers most relevant to you, and those links will be highlighted in blue.






Application and Device Control

Application Control and Management

Users consistently highlight ThreatLocker’s application control and management capabilities as a standout feature of the platform. They appreciate the ease of approving software for execution, the ability to block unauthorized applications, and the detailed audit trail provided by ThreatLocker. The granular control over software installations, the option to request access for new software downloads, and the flexibility to grant temporary elevate mode for specific installations are all aspects that users find beneficial in enhancing their security posture. Additionally, the prebuilt templates and blocking rules offered by ThreatLocker streamline the setup process and save valuable time for administrators. (Source Reviews: 1, 2, 3, 4)

“ThreatLocker has paid for itself already. There have been a few times when a user has opened an attachment that had malware in it. ThreatLocker stopped it from executing.”Technician in Information Technology, Transportation/Trucking/Railroad, 51-200 employees

“ThreatLocker came with many prebuilt template for common software and utilities, like Office365, putty, Firefox, Google, etc. It came with a bunch of prebuilt blocking/ringfencing rules for utilities like powershell, hyper-v psexec, and many others. This saves setup time.”Technician in Information Technology, Transportation/Trucking/Railroad, 51-200 employees

“We use ThreatLocker to lock down client machines specifically for applications and adding USB devices. It allows us to easily generate reports that show what applications are allowed and which are blocked for compliance purposes.”Engineer in Information Technology, Information Technology & Services, 1-10 employees

USB and External Device Control

Users consistently praise ThreatLocker for its robust control over USB devices and external storage access. They appreciate the platform’s ability to effectively manage and monitor the use of these external devices, enhancing overall security measures. While some users may have minor concerns or suggestions for improvement in this area, the general consensus leans towards positive feedback regarding ThreatLocker’s USB and external device control functionalities. (Source Reviews: 1, 2)

“We use ThreatLocker to lock down client machines specifically for applications and adding USB devices. It allows us to easily generate reports that show what applications are allowed and which are blocked for compliance purposes.”Engineer in Information Technology, Information Technology & Services, 1-10 employees

“ThreatLocker provides us with an all-in-one zero trust solution – Application Control, Privileged Access Management (PAM) and storage access control. We use ThreatLocker to provide a higher level of security for our clients while reducing the risks of attacks and breaches.”General Manager in Information Technology, Computer & Network Security, 1-10 employees

Security for End Users and Clients

Users generally appreciate ThreatLocker’s security for end users and clients, citing its effectiveness in protecting against unwanted or unknown programs that could compromise the network. However, there are mixed opinions on its suitability for tech-savvy IT firms, with some users feeling it may not cater to their specific needs. Despite this, ThreatLocker’s ability to provide a higher level of security for clients across diverse IT environments is acknowledged, particularly in industries like law firms where the risk of malware infections and data breaches is a significant concern. (Source Reviews: 1, 2, 3, 4)

“ThreatLocker’s automated threat detection and response capabilities provide an extra layer of security for our law firm clients, reducing the risk of malware infections and data breaches.”General Manager in Information Technology, Computer & Network Security, 1-10 employees

“Any organization taking security and zero trust seriously. However, if an organization does not have the manpower/care to carefully build and maintain a true Zero Trust environment, then it’s not for them.”Engineer in Information Technology, Information Technology & Services, 11-50 employees

“We use ThreatLocker to provide a higher level of security for our clients while reducing the risks of attacks and breaches.”General Manager in Information Technology, Computer & Network Security, 1-10 employees

Network and Data Security

Zero Trust Security

Users generally praise ThreatLocker’s robust zero trust security features. The consensus among reviewers is that ThreatLocker effectively enhances network and data security through its zero trust approach. Users appreciate the platform’s ability to provide a higher level of security for clients while mitigating the risks of cyber attacks and breaches. The automated threat detection and response capabilities, coupled with access control to critical systems and data, are highlighted as key strengths of ThreatLocker’s zero trust security implementation. (Source Reviews: 1, 2, 3)

“By helping to implementate Zero-trust architecture. Currently working to roll out to all clients. Any organization taking security and zero trust seriously.”Engineer in Information Technology, Information Technology & Services, 11-50 employees

“We use Threat Locker as a zero trust solution to protect the end users we manage. We trained on the use of the software and utilize the learning mode before go live.”Engineer in Information Technology, Information Technology & Services, 11-50 employees

“We needed a practical and affordable zero trust solution, and ThreatLocker was the only one that could deliver. ThreatLocker provides us with an all-in-one zero trust solution – Application Control, Privileged Access Management (PAM) and storage access control.”General Manager in Information Technology, Computer & Network Security, 1-10 employees

Malware and Ransomware Protection

Users consistently praise ThreatLocker’s robust malware and ransomware protection features. They highlight how ThreatLocker effectively prevents malware execution, stops ransomware attacks, and enhances overall cybersecurity posture. Reviewers emphasize that ThreatLocker’s proactive approach to blocking unknown software and updates has been instrumental in safeguarding their systems against potential threats. Additionally, users appreciate the ease of monitoring and managing security settings across all endpoints, ensuring timely support and remediation when necessary. (Source Reviews: 1, 2, 3, 4, 5)

“ThreatLocker has paid for itself already. There have been a few times when a user has opened an attachment that had malware in it. ThreatLocker stopped it from executing.”Technician in Information Technology, Transportation/Trucking/Railroad, 51-200 employees

“I believe that ThreatLocker has prevented us from getting ransomware. I have it set up to block the use of any encryption tools. I know on multiple occasions, ThreatLocker has blocked malware from executing.”Technician in Information Technology, Transportation/Trucking/Railroad, 51-200 employees

“Too early on to tell, however, if ThreatLocker ends up blocking just one ransomware attack for any of our clients, I’d argue that it paid for itself.”Engineer in Information Technology, Information Technology & Services, 11-50 employees

Cybersecurity and Threat Prevention

Reviewers consistently praise ThreatLocker for its robust cybersecurity and threat prevention capabilities, emphasizing its effectiveness in safeguarding against cyber threats and unauthorized access. Users express confidence in ThreatLocker’s ability to mitigate risks of breaches and attacks, highlighting its role in enhancing overall network security. The platform’s affordability and ease of implementation further contribute to its positive reception among users seeking reliable cybersecurity solutions. (Source Reviews: 1, 2, 3, 4)

“ThreatLocker’s automated threat detection and response capabilities provide an extra layer of security for our law firm clients, reducing the risk of malware infections and data breaches.”General Manager in Information Technology, Computer & Network Security, 1-10 employees

“Too early on to tell, however, if ThreatLocker ends up blocking just one ransomware attack for any of our clients, I’d argue that it paid for itself.”Engineer in Information Technology, Information Technology & Services, 11-50 employees

About the Author

TrustRadius Product Guides are created by synthesizing user reviews to identify commonly discussed topics. These guides highlight common use cases, frequently used features, and more. While this is a beta feature, it is our mission is to provide you with the best information possible to make confident and trusted technology decisions. If you feel something is missing or incorrect, please let us know.

Sign up to receive more buyer resources and tips.