284 ThreatLocker Reviews

ThreatLocker is a powerful security solution that gives administrators full control over what users can install, run, or script. Its default-deny approach ensures that only explicitly approved actions are allowed, making it easy to sleep at night knowing that even if users click on dangerous files, they won’t execute in secure mode. Review collected by and hosted on G2.com.
ThreatLocker has a steep learning curve, generates frequent alerts that can overwhelm teams, and offers limited support for mobile platforms. While it provides strong security controls, it may be challenging for smaller organizations or those without dedicated IT staff to manage effectively Review collected by and hosted on G2.com.
* ThreatLocker treats each app as a system and can isolate them - for example Edge acts like malware when it reads Chrome's data. TL can stop that. TL can flat out stop all executing software from accessing a QuickBooks data file except QuickBooks.
* ThreatLocker allows businesses to ensure that computers just can't run programs they're not allowed to run whether that software be a game, a portable exe, or never before seen malware. Not on the allow list means does not run.
* ThreatLocker Network control allows an me to block all incoming access to a server UNLESS the client is running our ThreatLocker.
* ThreatLocker blocks Winword.exe from running PowerShell, blocks Chrome extensions from executing CMD and blocks PowerShell from reaching out to the Internet.
* With the full support of the Cyber Heros, at any time of day or night my users can be denied permission to run an application, press a button to request that they be granted access and have that request granted! For the record, the Cyber Heros will approve a legitimate installer from Epson for a printer but will deny game installers and malware. ThreatLocker is making security EASIER for me and the users who are secured.
* ThreatLocker is powerful and covers so many holes in Windows security. Onboarding is made easy through weekly meetings with a dedicated SE who will guide you through implementing one module at a time. We're eight months in and still meet semi-weekly to work on new modules.
* Initial integration is painless for the admins and users. Install the client on all your end points and let it observe and report in. Allow rules are made on a computer-by-computer basis to ensure that when you take the computer out of monitor mode it won't cause trouble for the user. Policies created on a single machine can easily be promoted to apply to an entire group of computers. This learning mode is designed to be transparent for the end users but does require a good amount of attention from the administrator who has 100% control of the process - it is not magic.
* I could go on and on. Review collected by and hosted on G2.com.
I have found no downsides to using ThreatLocker but can say that their system is comprand complicated, I am very happy that we have the Cyber Heros available to help when necessary through the Cyber Hero MDR. Review collected by and hosted on G2.com.
Speedy Cyber hero response in adding updated approved applications to existing policies and being able to have general meetings to support our environment and learn more about the product and its features. Review collected by and hosted on G2.com.
Elevation control is not managed by cyberhero's.
Also - when a program is requested to be installed / updated there are several requests that need to go thru like an exe and as the program installs a dll might also needs to be requested to be approved; this makes the process of installing / updating programs when using threatlocker longer and often frustrating for the end user. Review collected by and hosted on G2.com.

Threatlocker has been essential is helping to refine and mature our zero trust approach from a reactive to proactive approach. I have often stated it is the single most important cybersecurity tool we have implemented in the last 10 years…it’s simply that good. In two words…its easy to implement, easy to use and 100% effective.
Beyond the tool, the company stands behind the product with seemingly unlimited systems engineering support…in other words, they are committed to helping you get the best out of the tool as opposed to gettitng the most out of their contract with you…its quite refreshing. Review collected by and hosted on G2.com.
I know it is not sweet spot but I would like to see some of the capability of Threatlocker make their way to corporate managed mobile devices…specifically IPadOS. Review collected by and hosted on G2.com.

ThreatLocker flips traditional endpoint security on its head with the premise of default deny. Traditional endpoint security does its best to detect malicious files and processes and implement blocks on those items and allow everything else. Threatlocker blocks everything by default and only allows software that you have specifically allowed to run. We have seen first hand this method has prevented many malicious activities and as a managed service provider, the tool has given us some extra peace of mind in that our end users will not be able to install or run undesirable software. Review collected by and hosted on G2.com.
ThreatLocker is a complex tool that offers many features with granular control. For that reason it does come with a large learning curve. It is highly recommended that you work closely with their support team until you are completely comfortable with the ins and outs of the software. Review collected by and hosted on G2.com.

It allows me to sleep easier knowing that we have a much stronger barrier. With how good the Cyber Hero team is, it really takes away any headaches when it comes to security—they’re incredibly quick and helpful with anything I need assistance on. Knowing I have the support of their MDR team 24/7 gives us real security no matter what. Review collected by and hosted on G2.com.
It takes some time to fine-tune policies, especially in the beginning, and managing approvals can be a bit of a learning curve. It’s not a “set-it-and-forget-it” tool, but once properly configured, it provides solid security without too much ongoing hassle. Review collected by and hosted on G2.com.
Deny all, unless approved. Threatlocker have paid for itself a few times now. I had a user who was too, hurrying through a bunch of emails and accidentally clicked on a link. It was a malicious link and tried to execute something. The user called me and said something flashed across the screen. I checked ThreatLocker. ThreatLocker stopped the loading of a malware.
I had another incident where a purchaser was trying to order a part they found online. The purchaser kept clicking on the order button and a message kept popping up. The purchaser wasn’t reading the message. When I seen what they were doing . I asked why they didn’t read the message? I explained that the order button was trying steal the credit information. It was a banker Trojan virus. Review collected by and hosted on G2.com.
Sometimes I will get a deny and I can’t figure what it is because it was created by a common Microsoft process. Review collected by and hosted on G2.com.

First and foremost, the Threatlocker (TL) support team is excellent. Our experience was consistent throughout implementation and didn't drop off after we were up and running. Our use of TL is constantly changing and growing. The solutions engineers have been there too to guide us along the way.
Or organization runs at a fast and competitive rate so traditional application change requests are to slow and to cumbersome for users.
I also never expected TL to take us beyond application control, but their network control module enabled us to layer additional security on top of network segmentation. I'm addition to several other modules TL is the closest solution we have to a "single pane of glass" that simplifies management. Review collected by and hosted on G2.com.
The early version of the UI was missing some elements that made certain actions cumbersome. However this was resolved in the new version that was released while we were still in the implementation phase. Review collected by and hosted on G2.com.
The support is fantastic. The product performs as advertised. I love that I can reach out to our account manager, Antonietta, with questions and she will setup a technical call to bounce some ideas. Review collected by and hosted on G2.com.
Sometimes the policies and ideas around ring-fencing can be a bit confusing but i understand its that way because the nature of the Windows operating systems and various 3rd party applications its protecting. Maybe there's some opportunities to make that easier to grasp.. maybe not.. Review collected by and hosted on G2.com.
Threatlocker is a great tool for blocking unwanted or unauthorized programs or scripts from running. Effectively stopping attacks before they can even start. It deployed quickly through our RMM, and generates tickets as needed in our PSA system. Review collected by and hosted on G2.com.
Learning curve can be high at first, but they offer great support to make sure we are getting things done right. Review collected by and hosted on G2.com.