ThreatLocker Product Guide
Thinking about purchasing ThreatLocker? Check out our in-depth guide, synthesized from authentic user reviews. We’ve summarized users’ thoughts about how well ThreatLocker works for them.
Highlight the Right Reviews
Throughout the guide below, there are links directly to reviews. Select the reviewers most relevant to you, and those links will be highlighted in blue.
Table of Contents
Application and Device Control
Application Control and Management
Users consistently highlight ThreatLocker’s application control and management capabilities as a standout feature of the platform. They appreciate the ease of approving software for execution, the ability to block unauthorized applications, and the detailed audit trail provided by ThreatLocker. The granular control over software installations, the option to request access for new software downloads, and the flexibility to grant temporary elevate mode for specific installations are all aspects that users find beneficial in enhancing their security posture. Additionally, the prebuilt templates and blocking rules offered by ThreatLocker streamline the setup process and save valuable time for administrators. (Source Reviews: 1, 2, 3, 4)
“ThreatLocker has paid for itself already. There have been a few times when a user has opened an attachment that had malware in it. ThreatLocker stopped it from executing.” – Technician in Information Technology, Transportation/Trucking/Railroad, 51-200 employees
“ThreatLocker came with many prebuilt template for common software and utilities, like Office365, putty, Firefox, Google, etc. It came with a bunch of prebuilt blocking/ringfencing rules for utilities like powershell, hyper-v psexec, and many others. This saves setup time.” – Technician in Information Technology, Transportation/Trucking/Railroad, 51-200 employees
“We use ThreatLocker to lock down client machines specifically for applications and adding USB devices. It allows us to easily generate reports that show what applications are allowed and which are blocked for compliance purposes.” – Engineer in Information Technology, Information Technology & Services, 1-10 employees
USB and External Device Control
Users consistently praise ThreatLocker for its robust control over USB devices and external storage access. They appreciate the platform’s ability to effectively manage and monitor the use of these external devices, enhancing overall security measures. While some users may have minor concerns or suggestions for improvement in this area, the general consensus leans towards positive feedback regarding ThreatLocker’s USB and external device control functionalities. (Source Reviews: 1, 2)
“We use ThreatLocker to lock down client machines specifically for applications and adding USB devices. It allows us to easily generate reports that show what applications are allowed and which are blocked for compliance purposes.” – Engineer in Information Technology, Information Technology & Services, 1-10 employees
“ThreatLocker provides us with an all-in-one zero trust solution – Application Control, Privileged Access Management (PAM) and storage access control. We use ThreatLocker to provide a higher level of security for our clients while reducing the risks of attacks and breaches.” – General Manager in Information Technology, Computer & Network Security, 1-10 employees
Security for End Users and Clients
Users generally appreciate ThreatLocker’s security for end users and clients, citing its effectiveness in protecting against unwanted or unknown programs that could compromise the network. However, there are mixed opinions on its suitability for tech-savvy IT firms, with some users feeling it may not cater to their specific needs. Despite this, ThreatLocker’s ability to provide a higher level of security for clients across diverse IT environments is acknowledged, particularly in industries like law firms where the risk of malware infections and data breaches is a significant concern. (Source Reviews: 1, 2, 3, 4)
“ThreatLocker’s automated threat detection and response capabilities provide an extra layer of security for our law firm clients, reducing the risk of malware infections and data breaches.” – General Manager in Information Technology, Computer & Network Security, 1-10 employees
“Any organization taking security and zero trust seriously. However, if an organization does not have the manpower/care to carefully build and maintain a true Zero Trust environment, then it’s not for them.” – Engineer in Information Technology, Information Technology & Services, 11-50 employees
“We use ThreatLocker to provide a higher level of security for our clients while reducing the risks of attacks and breaches.” – General Manager in Information Technology, Computer & Network Security, 1-10 employees
Network and Data Security
Zero Trust Security
Users generally praise ThreatLocker’s robust zero trust security features. The consensus among reviewers is that ThreatLocker effectively enhances network and data security through its zero trust approach. Users appreciate the platform’s ability to provide a higher level of security for clients while mitigating the risks of cyber attacks and breaches. The automated threat detection and response capabilities, coupled with access control to critical systems and data, are highlighted as key strengths of ThreatLocker’s zero trust security implementation. (Source Reviews: 1, 2, 3)
“By helping to implementate Zero-trust architecture. Currently working to roll out to all clients. Any organization taking security and zero trust seriously.” – Engineer in Information Technology, Information Technology & Services, 11-50 employees
“We use Threat Locker as a zero trust solution to protect the end users we manage. We trained on the use of the software and utilize the learning mode before go live.” – Engineer in Information Technology, Information Technology & Services, 11-50 employees
“We needed a practical and affordable zero trust solution, and ThreatLocker was the only one that could deliver. ThreatLocker provides us with an all-in-one zero trust solution – Application Control, Privileged Access Management (PAM) and storage access control.” – General Manager in Information Technology, Computer & Network Security, 1-10 employees
Malware and Ransomware Protection
Users consistently praise ThreatLocker’s robust malware and ransomware protection features. They highlight how ThreatLocker effectively prevents malware execution, stops ransomware attacks, and enhances overall cybersecurity posture. Reviewers emphasize that ThreatLocker’s proactive approach to blocking unknown software and updates has been instrumental in safeguarding their systems against potential threats. Additionally, users appreciate the ease of monitoring and managing security settings across all endpoints, ensuring timely support and remediation when necessary. (Source Reviews: 1, 2, 3, 4, 5)
“ThreatLocker has paid for itself already. There have been a few times when a user has opened an attachment that had malware in it. ThreatLocker stopped it from executing.” – Technician in Information Technology, Transportation/Trucking/Railroad, 51-200 employees
“I believe that ThreatLocker has prevented us from getting ransomware. I have it set up to block the use of any encryption tools. I know on multiple occasions, ThreatLocker has blocked malware from executing.” – Technician in Information Technology, Transportation/Trucking/Railroad, 51-200 employees
“Too early on to tell, however, if ThreatLocker ends up blocking just one ransomware attack for any of our clients, I’d argue that it paid for itself.” – Engineer in Information Technology, Information Technology & Services, 11-50 employees
Cybersecurity and Threat Prevention
Reviewers consistently praise ThreatLocker for its robust cybersecurity and threat prevention capabilities, emphasizing its effectiveness in safeguarding against cyber threats and unauthorized access. Users express confidence in ThreatLocker’s ability to mitigate risks of breaches and attacks, highlighting its role in enhancing overall network security. The platform’s affordability and ease of implementation further contribute to its positive reception among users seeking reliable cybersecurity solutions. (Source Reviews: 1, 2, 3, 4)
“ThreatLocker’s automated threat detection and response capabilities provide an extra layer of security for our law firm clients, reducing the risk of malware infections and data breaches.” – General Manager in Information Technology, Computer & Network Security, 1-10 employees
“Too early on to tell, however, if ThreatLocker ends up blocking just one ransomware attack for any of our clients, I’d argue that it paid for itself.” – Engineer in Information Technology, Information Technology & Services, 11-50 employees