Introducing G2.ai, the future of software buying.Try now

Compare Sophos Endpoint and ThreatLocker

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Sophos Endpoint
Sophos Endpoint
Star Rating
(462)4.6 out of 5
Market Segments
Mid-Market (65.2% of reviews)
Information
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Sophos Endpoint
ThreatLocker
ThreatLocker
Star Rating
(284)4.8 out of 5
Market Segments
Small-Business (61.1% of reviews)
Information
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that "Sophos Intercept X: Next-Gen Endpoint" excels in "Quality of Support" with a score of 8.7, while "ThreatLocker" shines with an impressive score of 9.8, indicating that users find ThreatLocker's support to be more responsive and helpful.
  • Reviewers mention that "Sophos Intercept X" offers superior "Malware Detection" capabilities, scoring 9.7 compared to ThreatLocker's 8.8, suggesting that users feel more secure with Sophos in identifying and mitigating malware threats.
  • G2 users highlight that "ThreatLocker" has a stronger "Application Control" feature, scoring 9.7 versus Sophos's 9.3, which indicates that users appreciate ThreatLocker's ability to manage and control applications more effectively.
  • Users on G2 report that "Sophos Intercept X" provides better "Ease of Use" with a score of 9.2, while "ThreatLocker" received a lower score of 8.5, suggesting that users find Sophos more intuitive and user-friendly.
  • Reviewers say that "ThreatLocker" has a notable advantage in "Compliance" with a score of 9.6 compared to Sophos's 9.4, indicating that users feel more confident in ThreatLocker's ability to help them meet regulatory requirements.
  • Users report that "Sophos Intercept X" has a more robust "Proactive Threat Hunting" feature, scoring 9.2, while "ThreatLocker" scored lower in this area, suggesting that users value Sophos's proactive approach to identifying potential threats before they escalate.
Featured Products
Pricing
Entry-Level Pricing
Sophos Endpoint
No pricing available
ThreatLocker
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
Sophos Endpoint
Free Trial is available
ThreatLocker
Free Trial is available
Ratings
Meets Requirements
9.3
346
9.6
130
Ease of Use
9.2
352
8.4
236
Ease of Setup
9.2
312
8.5
224
Ease of Admin
9.3
308
8.6
124
Quality of Support
8.7
338
9.8
129
Has the product been a good partner in doing business?
9.2
305
9.7
123
Product Direction (% positive)
9.1
333
9.7
123
Features by Category
Not enough data
Not enough data
Network Management
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.4
102
8.8
49
Administration
9.4
90
9.2
47
9.2
95
8.3
42
9.3
90
9.6
47
9.3
82
8.1
45
9.3
88
8.5
48
Functionality
9.4
90
9.1
45
9.4
84
8.9
44
9.6
91
8.8
18
9.6
93
8.8
42
Analysis
9.3
90
Feature Not Available
9.3
90
7.7
19
9.4
90
8.4
46
Extended Detection and Response (XDR) PlatformsHide 13 FeaturesShow 13 Features
9.3
125
Not enough data
Detection & Response
9.1
114
Not enough data
9.4
118
Not enough data
9.4
118
Not enough data
9.6
120
Not enough data
Management
9.2
112
Not enough data
8.8
107
Not enough data
9.2
110
Not enough data
Analytics
9.4
118
Not enough data
9.0
112
Not enough data
9.2
111
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Managed Detection and Response (MDR)Hide 8 FeaturesShow 8 Features
Not enough data
9.3
13
Platform Features
Not enough data
9.4
13
Not enough data
8.8
13
Not enough data
9.5
13
Not enough data
8.7
13
Not enough data
9.0
13
Not enough data
7.6
13
Automation Capabilities
Not enough data
8.2
13
Not enough data
8.1
13
8.3
105
Not enough data
Generative AI
8.2
104
Not enough data
8.3
106
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
14
Orchestration
Not enough data
9.0
14
Not enough data
9.0
14
Not enough data
9.0
14
Not enough data
9.5
14
Information
Not enough data
9.4
14
Not enough data
9.0
14
Not enough data
9.5
14
Personalization
Not enough data
9.3
14
Not enough data
9.0
14
Not enough data
8.5
14
Generative AI
Not enough data
7.7
8
Agentic AI - Threat Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Sophos Endpoint
Sophos Endpoint
ThreatLocker
ThreatLocker
Sophos Endpoint and ThreatLocker are categorized as Endpoint Protection Platforms and Endpoint Detection & Response (EDR)
Reviews
Reviewers' Company Size
Sophos Endpoint
Sophos Endpoint
Small-Business(50 or fewer emp.)
12.9%
Mid-Market(51-1000 emp.)
65.2%
Enterprise(> 1000 emp.)
21.9%
ThreatLocker
ThreatLocker
Small-Business(50 or fewer emp.)
61.1%
Mid-Market(51-1000 emp.)
32.2%
Enterprise(> 1000 emp.)
6.7%
Reviewers' Industry
Sophos Endpoint
Sophos Endpoint
Information Technology and Services
11.5%
Computer & Network Security
5.5%
Hospital & Health Care
4.8%
Computer Software
4.8%
Education Management
4.4%
Other
68.9%
ThreatLocker
ThreatLocker
Information Technology and Services
36.7%
Computer & Network Security
19.1%
Hospital & Health Care
4.2%
Accounting
3.2%
Government Administration
2.8%
Other
33.9%
Most Helpful Reviews
Sophos Endpoint
Sophos Endpoint
Most Helpful Favorable Review
BW
Brock W.
Verified User in Telecommunications

I like how easy it is to configure and manage, as well as how well it works. I have had extremely good luck with it, and i have used it since it was in beta form. I have looked at other offerings, but keep sticking with Sophos, which must mean something.

Most Helpful Critical Review
Nick B.
NB
Nick B.
Verified User in Education Management

Seems to slow down older computers easily.

ThreatLocker
ThreatLocker
Most Helpful Favorable Review
David P.
DP
David P.
Verified User in Telecommunications

I have told our representative this many times: Threatlocker needs to hold seminars on how to run a company with ensuing support. There are essentially 3 things, but they are HUGE and encompass 100% of the product. As a daily user of the product, the...

Most Helpful Critical Review
TV
Teng V.
Verified User in Government Administration

The thing about ThreatLocker is the admin has to know what they're doing. If they don't it can be a major pain in the thorn for your team. So ask yourself, does my admin know what they're doing? If they don't, I would look for a more admin friendly platform.

Alternatives
Sophos Endpoint
Sophos Endpoint Alternatives
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
Bitdefender GravityZone
Bitdefender GravityZone
Add Bitdefender GravityZone
ThreatLocker
ThreatLocker Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Discussions
Sophos Endpoint
Sophos Endpoint Discussions
Is Sophos Endpoint an antivirus?
1 comment
PS
Certainly! Please provide the text in the Unknown Language that you would like translated into English.Read more
Is Sophos intercept x any good?
1 comment
okan k.
OK
Yes, it is good. Low footprint and updates are small so faster updating of definition files. Read more
Monty the Mongoose crying
Sophos Endpoint has no more discussions with answers
ThreatLocker
ThreatLocker Discussions
Does ThreatLocker work on Mac?
2 comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more