Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
Capterra carefully verified over 2 million reviews to bring you authentic software and services experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. Learn more.
Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software and service providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. Learn more.
Industries and businesses of all sizes looking to enable Zero Trust posture cybersecurity.
This is a business solution for any business that wants a vital security layer at the HTTP and HTTPS layer and wants to control web content.
What I like the most is the ThreatLocker support, it's excellent. Most of my questions have been answered through the university or the help page.
You can get lost in there! when dealing with software devleopers or engineers, it can seem to restrictive.
The cost of this tool and the time to set it up is worth it. This tool gives us a fantastic peace of mind in environments we have it deployed in.
Threatlocker is not a set it and forget it product.
It’s the best product out there for application whitelisting. It’s easy to use, it’s MSP friendly, has some of the best support I’ve ever experienced from a vendor.
It will stop anything and everything that either isn't allowed to run or it doesn't recognize.
My experience with ThreatLocker has been particularly positive, largely due to the outstanding technical support they offer.
It will restrict access on installing or executing apps you don't want.
It is a solution that can be perfectly integrated and it really is very effective for what you are looking for.
The IP configuration part of it, was quite particular, if you get it wrong, you'll have problems.
Some of its best features include the ease of setting it up, its ability to filter encrypted connections, the ability to filter specific url their fantastic customer support.
There was no pressure to purchase the software. The trial started out for a week and one email to rep to see if we could have more time and before we were off the phone it was extended to a month.
Good performance and simple implementation. I find this solution perfect for SME with not too complex networks configuration (absence of IAG).
I cannot seem to get it to show the same list of blocked attempts in the email. I can only get a block count by category along with a unique domain count.
Also very impressed with the customer service. They are very professional and responsive.
Over time, it became obvious that they were not supporting it well (or at all), all the while charging me a premium for it. Spam Titan on the other hand does the job well.
Speaker 1: Hi, I'm Daniel, CEO of Unique IT Pro. We're about 12 deep and my rating for ThreatLocker is a five. So before ThreatLocker, we used to just rely on basically taking away the local admin permission, not allowing users to have local admin. But we had a lot of challenges with people wanting that permission because they couldn't do things like install printers at home. So it was very challenging and it wasn't protecting. It was just a step in the right direction. But we're glad ThreatLocker came along. So when I basically was introduced to ThreatLocker, the application Whitelisting, the Elevation Control, those two made it a no-brainer for me to go with ThreatLocker. But then the additional stuff such as Ring Fencing, basically the ability to keep applications in their own lane and to use storage control. And when you look at ThreatLocker today and how they've evolved, I'm so happy that I selected ThreatLocker a few years ago. Going into any new solution, you always worry about not having the engineers and the time to take on such a solution, but ThreatLocker's onboarding where you spend some time with their engineer, it just made it so easy. We deployed. We met with him. Then we had a review 30 days later to secure the systems and he explained everything through the unified audit logs. And it just seemed like a blink of an eye, he was already using ThreatLocker internally and we were so ready to go to market. My advice to those considering ThreatLocker is it does so much. Don't feel overwhelmed. Don't feel like it's going to be too noisy. You got to go into it one component at a time. Do like we did. We did our test lab, then we did our internal systems before we got our feet wet with it, before we were ready to start taking on our clients. So I think you have to have that type of approach, phase into it, and don't try to just do the whole thing. Have your appetizer first before you get to your entree.
ThreatLocker
WebTitan
Top FeaturesThreatLocker
WebTitan
--
Products similar to those you're currently comparing: