Introducing G2.ai, the future of software buying.Try now

ThreatLocker Reviews & Product Details

ThreatLocker Overview

What is ThreatLocker?

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com.

ThreatLocker Details
Product Website
Languages Supported
English
Show LessShow More
Product Description

Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.


Seller

Threatlocker Inc

Description

ThreatLocker® is a global leader in Zero Trust endpoint security. The ThreatLocker® Zero Trust Endpoint Protection Platform combines Application Allowlisting, Ringfencing™, Network Control, Storage Control, Elevation Control, and Endpoint Detection and Response solutions in ways that make security simple for the IT professional. ThreatLocker® utilizes a deny by default approach that blocks all software, including ransomware, from running unless it is explicitly allowed. Since its founding in
017, ThreatLocker® has been recognized as one of the best cybersecurity protection platforms that now includes EDR, MDR and compliance-friendly controls and monitoring.

Overview Provided by:

ThreatLocker Integrations

(7)
Verified by ThreatLocker

Recent ThreatLocker Reviews

JK
jefferson K.Enterprise (> 1000 emp.)
4.5 out of 5
"ThreatLocker is an excellent complement to antivirus and EDR."
The CThreatLocker application is a powerful solution for enhancing security through a default-deny policy, especially in a Zero Trust framework. It...
Graham T.
GT
Graham T.Mid-Market (51-1000 emp.)
5.0 out of 5
"ThreatLocker is a powerful security solution that gives administrators full control"
ThreatLocker is a powerful security solution that gives administrators full control over what users can install, run, or script. Its default-deny a...
Verified User
C
Verified UserSmall-Business (50 or fewer emp.)
5.0 out of 5
"Easy to use application zero-trust security."
Nothing gets installed without first being approved, and Threatlocker NOC handles the approval for most requests.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

6 months

Average Discount

11%

Perceived Cost

$$$$$
View More Pricing Information

ThreatLocker Media

ThreatLocker Demo - Application Control
The ThreatLocker solution combines advanced software and service, allowing you to deploy Application Allowlisting unique to your organization in a few hours, without the management overhead. Our 24-hour operations center continuously monitors for application and operating system updates, so you...
ThreatLocker Demo - Unified Audit
Full granular audit of every application, library, and script opened in realtime, including the computer, hash, certificate, process, and user that opened it. When combined with storage policies, full details of all files and documents accessed, changed, deleted, or moved are recorded in the audi...
ThreatLocker Demo - Approval Center
Our 60-second single click approval allows you to easily control what is running on your endpoints.
ThreatLocker Demo - Elevation Control (Endpoint Privilege Managment)
ThreatLocker® Elevation Control is an endpoint privilege management tool that enables system administrators to revoke local administrator rights from their users and execute specific applications with elevated privileges.
ThreatLocker Demo - 24/7 Live Support
Our ThreatLocker Cyber Hero Team offers 24/7 live support.
ThreatLocker Demo - Security Rating
Cybersecurity is complicated. Understanding cyber risk doesn't have to be. See our Security Rating at: https://securityscorecard.com/security-rating/threatlocker.com/
ThreatLocker - Full Product Demonstration
Play ThreatLocker Video
ThreatLocker - Full Product Demonstration
Mark Toalson, IT Director, and Brian Perkinson, Network Engineer of City of Champaign, Illinois, enthusiastically discuss their positive experience implementing the ThreatLocker®  within their organization.
Play ThreatLocker Video
Mark Toalson, IT Director, and Brian Perkinson, Network Engineer of City of Champaign, Illinois, enthusiastically discuss their positive experience implementing the ThreatLocker® within their organization.
Play ThreatLocker Video
Play ThreatLocker Video
Play ThreatLocker Video

Official Downloads

Answer a few questions to help the ThreatLocker community
Have you used ThreatLocker before?
Yes

284 ThreatLocker Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
284 ThreatLocker Reviews
4.8 out of 5
284 ThreatLocker Reviews
4.8 out of 5

ThreatLocker Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Graham T.
GT
Global Cyber Security Specialist
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about ThreatLocker?

ThreatLocker is a powerful security solution that gives administrators full control over what users can install, run, or script. Its default-deny approach ensures that only explicitly approved actions are allowed, making it easy to sleep at night knowing that even if users click on dangerous files, they won’t execute in secure mode. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

ThreatLocker has a steep learning curve, generates frequent alerts that can overwhelm teams, and offers limited support for mobile platforms. While it provides strong security controls, it may be challenging for smaller organizations or those without dedicated IT staff to manage effectively Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

ThreatLocker helps us manage the risk of users clicking without thinking by blocking unauthorized applications and controlling software usage. It gives us visibility and control over what runs in our environment, reducing the chances of accidental or malicious software execution. Review collected by and hosted on G2.com.

AB
Director of IT
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 Gives Campaign
Incentivized Review
What do you like best about ThreatLocker?

* ThreatLocker treats each app as a system and can isolate them - for example Edge acts like malware when it reads Chrome's data. TL can stop that. TL can flat out stop all executing software from accessing a QuickBooks data file except QuickBooks.

* ThreatLocker allows businesses to ensure that computers just can't run programs they're not allowed to run whether that software be a game, a portable exe, or never before seen malware. Not on the allow list means does not run.

* ThreatLocker Network control allows an me to block all incoming access to a server UNLESS the client is running our ThreatLocker.

* ThreatLocker blocks Winword.exe from running PowerShell, blocks Chrome extensions from executing CMD and blocks PowerShell from reaching out to the Internet.

* With the full support of the Cyber Heros, at any time of day or night my users can be denied permission to run an application, press a button to request that they be granted access and have that request granted! For the record, the Cyber Heros will approve a legitimate installer from Epson for a printer but will deny game installers and malware. ThreatLocker is making security EASIER for me and the users who are secured.

* ThreatLocker is powerful and covers so many holes in Windows security. Onboarding is made easy through weekly meetings with a dedicated SE who will guide you through implementing one module at a time. We're eight months in and still meet semi-weekly to work on new modules.

* Initial integration is painless for the admins and users. Install the client on all your end points and let it observe and report in. Allow rules are made on a computer-by-computer basis to ensure that when you take the computer out of monitor mode it won't cause trouble for the user. Policies created on a single machine can easily be promoted to apply to an entire group of computers. This learning mode is designed to be transparent for the end users but does require a good amount of attention from the administrator who has 100% control of the process - it is not magic.

* I could go on and on. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

I have found no downsides to using ThreatLocker but can say that their system is comprand complicated, I am very happy that we have the Cyber Heros available to help when necessary through the Cyber Hero MDR. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

Short version: ThreatLocker fills security gaps in Windows left by Microsoft and allows visibility into what is happening on EVERY computer I'm responsible for. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about ThreatLocker?

Speedy Cyber hero response in adding updated approved applications to existing policies and being able to have general meetings to support our environment and learn more about the product and its features. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

Elevation control is not managed by cyberhero's.

Also - when a program is requested to be installed / updated there are several requests that need to go thru like an exe and as the program installs a dll might also needs to be requested to be approved; this makes the process of installing / updating programs when using threatlocker longer and often frustrating for the end user. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

unapproved software cannot be installed and elevation of regular users Review collected by and hosted on G2.com.

John Michael G.
JG
Chief Information Officer (CIO)/Chief Information Security Officer (CISO)
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: Organic
What do you like best about ThreatLocker?

Threatlocker has been essential is helping to refine and mature our zero trust approach from a reactive to proactive approach. I have often stated it is the single most important cybersecurity tool we have implemented in the last 10 years…it’s simply that good. In two words…its easy to implement, easy to use and 100% effective.

Beyond the tool, the company stands behind the product with seemingly unlimited systems engineering support…in other words, they are committed to helping you get the best out of the tool as opposed to gettitng the most out of their contract with you…its quite refreshing. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

I know it is not sweet spot but I would like to see some of the capability of Threatlocker make their way to corporate managed mobile devices…specifically IPadOS. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

Threatlocker has allowed us to completely control the end user application experience while simultaneously allowing end users the freedom to introduce new tools in a controlled manner.

Additionally, the ability to further control the interactions of the applications themselves and the data points they access has further strengthened our environment. Review collected by and hosted on G2.com.

Bryan S.
BS
Support Engineer
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about ThreatLocker?

ThreatLocker flips traditional endpoint security on its head with the premise of default deny. Traditional endpoint security does its best to detect malicious files and processes and implement blocks on those items and allow everything else. Threatlocker blocks everything by default and only allows software that you have specifically allowed to run. We have seen first hand this method has prevented many malicious activities and as a managed service provider, the tool has given us some extra peace of mind in that our end users will not be able to install or run undesirable software. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

ThreatLocker is a complex tool that offers many features with granular control. For that reason it does come with a large learning curve. It is highly recommended that you work closely with their support team until you are completely comfortable with the ins and outs of the software. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

ThreatLocker helps protect our managed devices from malicious and unwanted actions, both from bad actors and our own end users. Even the initial implementation offers so much insight as you are able to capture a log of every process and software that is running in your environment. From there you can decide what is allowed to run in your environment and block everything else. We also utilize the Storage Control module for DLP, to prevent the spread of ransomware, and to restrict the use of USB drives and other removeable media. We also use Network Access Control to prevent communication between workstations, restrict access to network resources, and to require devices on our network to have Threatlocker installed in order to communicate with other devices. Review collected by and hosted on G2.com.

Thomas L.
TL
Service Delivery Manager
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: G2 Gives Campaign
Incentivized Review
What do you like best about ThreatLocker?

It allows me to sleep easier knowing that we have a much stronger barrier. With how good the Cyber Hero team is, it really takes away any headaches when it comes to security—they’re incredibly quick and helpful with anything I need assistance on. Knowing I have the support of their MDR team 24/7 gives us real security no matter what. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

It takes some time to fine-tune policies, especially in the beginning, and managing approvals can be a bit of a learning curve. It’s not a “set-it-and-forget-it” tool, but once properly configured, it provides solid security without too much ongoing hassle. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

ThreatLocker helps us lock down what runs in our environment, so we’re not constantly worrying about ransomware, malware, or unauthorized software slipping through. The default-deny approach means only approved applications can run, giving us way more control. On top of that, their storage and network controls help keep things even tighter. Having their 24/7 MDR support is a huge plus—it means if anything does pop up, we’ve got a team ready to jump on it, so we can focus on our work instead of stressing about security. Review collected by and hosted on G2.com.

Verified User in Manufacturing
AM
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: G2 Gives Campaign
Incentivized Review
What do you like best about ThreatLocker?

Deny all, unless approved. Threatlocker have paid for itself a few times now. I had a user who was too, hurrying through a bunch of emails and accidentally clicked on a link. It was a malicious link and tried to execute something. The user called me and said something flashed across the screen. I checked ThreatLocker. ThreatLocker stopped the loading of a malware.

I had another incident where a purchaser was trying to order a part they found online. The purchaser kept clicking on the order button and a message kept popping up. The purchaser wasn’t reading the message. When I seen what they were doing . I asked why they didn’t read the message? I explained that the order button was trying steal the credit information. It was a banker Trojan virus. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

Sometimes I will get a deny and I can’t figure what it is because it was created by a common Microsoft process. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

It has stopped unwanted execution of programs. Threatlocker keeps users from installing programs on their computer. I have had new users try to install programs and browsers extensions on their computer without permission.

Threatlocker will not Install programs updates whenever its wants without Threatlocker approval. Review collected by and hosted on G2.com.

Douglas S.
DS
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: G2 Gives Campaign
Incentivized Review
What do you like best about ThreatLocker?

First and foremost, the Threatlocker (TL) support team is excellent. Our experience was consistent throughout implementation and didn't drop off after we were up and running. Our use of TL is constantly changing and growing. The solutions engineers have been there too to guide us along the way.

Or organization runs at a fast and competitive rate so traditional application change requests are to slow and to cumbersome for users.

I also never expected TL to take us beyond application control, but their network control module enabled us to layer additional security on top of network segmentation. I'm addition to several other modules TL is the closest solution we have to a "single pane of glass" that simplifies management. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

The early version of the UI was missing some elements that made certain actions cumbersome. However this was resolved in the new version that was released while we were still in the implementation phase. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

Application Control

Advanced Network Control

Local Elevation Control

Emergency Mitigation of Zero Days

Local Firewall management

Some Config management Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about ThreatLocker?

The support is fantastic. The product performs as advertised. I love that I can reach out to our account manager, Antonietta, with questions and she will setup a technical call to bounce some ideas. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

Sometimes the policies and ideas around ring-fencing can be a bit confusing but i understand its that way because the nature of the Windows operating systems and various 3rd party applications its protecting. Maybe there's some opportunities to make that easier to grasp.. maybe not.. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

Solves the problem of end users installing any apps they way. Solves the containment problem if one machine gets infected, makes it harder for lateral movement. Also checks a box on our customer's insurance applications. Review collected by and hosted on G2.com.

IM
Service Manager
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about ThreatLocker?

Threatlocker is a great tool for blocking unwanted or unauthorized programs or scripts from running. Effectively stopping attacks before they can even start. It deployed quickly through our RMM, and generates tickets as needed in our PSA system. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

Learning curve can be high at first, but they offer great support to make sure we are getting things done right. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

Prevents unwanted, unsafe programs from being installed, and ensures only approved applications will run without prior approval. Review collected by and hosted on G2.com.