Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology. Learn more.
Capterra carefully verified over 2 million reviews to bring you authentic software and services experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. Learn more.
Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software and service providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. Learn more.
Industries and businesses of all sizes looking to enable Zero Trust posture cybersecurity.
Scales to organizations large and small, in any industry. No limit to devices, users, accounts, or mail flow. Built for Enterprise, Government, Critical Infrastructure, and SMB.
What I like the most is the ThreatLocker support, it's excellent. Most of my questions have been answered through the university or the help page.
You can get lost in there! when dealing with software devleopers or engineers, it can seem to restrictive.
The cost of this tool and the time to set it up is worth it. This tool gives us a fantastic peace of mind in environments we have it deployed in.
Threatlocker is not a set it and forget it product.
It’s the best product out there for application whitelisting. It’s easy to use, it’s MSP friendly, has some of the best support I’ve ever experienced from a vendor.
It will stop anything and everything that either isn't allowed to run or it doesn't recognize.
My experience with ThreatLocker has been particularly positive, largely due to the outstanding technical support they offer.
It will restrict access on installing or executing apps you don't want.
It provided a lot of information about the network which was unknown before. The UI is nice and being able to see raw network logs is useful.
Information Overload, but hard to understand the information provided.
The detection features are extremely useful, it is what the busy IT /Security or even advance pro use will want to see as time progress over his cooperate network.
There are very limited education materials on how to use Darktrace.
It is good product with its AI engine and capable to learn the network. More helpful to identify ongoing threats and during forensic investigations.
The cost was the biggest downside, but we learned you get what you pay for.
Interfaces are nice and provide detailed view of incidents. It needs improvements on reporting capabilities.
Plus the advanced search fuctionality is not very well defined. The lack of reporting also makes it a bit challenging.
Speaker 1: Hi, I'm Daniel, CEO of Unique IT Pro. We're about 12 deep and my rating for ThreatLocker is a five. So before ThreatLocker, we used to just rely on basically taking away the local admin permission, not allowing users to have local admin. But we had a lot of challenges with people wanting that permission because they couldn't do things like install printers at home. So it was very challenging and it wasn't protecting. It was just a step in the right direction. But we're glad ThreatLocker came along. So when I basically was introduced to ThreatLocker, the application Whitelisting, the Elevation Control, those two made it a no-brainer for me to go with ThreatLocker. But then the additional stuff such as Ring Fencing, basically the ability to keep applications in their own lane and to use storage control. And when you look at ThreatLocker today and how they've evolved, I'm so happy that I selected ThreatLocker a few years ago. Going into any new solution, you always worry about not having the engineers and the time to take on such a solution, but ThreatLocker's onboarding where you spend some time with their engineer, it just made it so easy. We deployed. We met with him. Then we had a review 30 days later to secure the systems and he explained everything through the unified audit logs. And it just seemed like a blink of an eye, he was already using ThreatLocker internally and we were so ready to go to market. My advice to those considering ThreatLocker is it does so much. Don't feel overwhelmed. Don't feel like it's going to be too noisy. You got to go into it one component at a time. Do like we did. We did our test lab, then we did our internal systems before we got our feet wet with it, before we were ready to start taking on our clients. So I think you have to have that type of approach, phase into it, and don't try to just do the whole thing. Have your appetizer first before you get to your entree.
ThreatLocker
Darktrace
Top FeaturesThreatLocker
Darktrace
--
Products similar to those you're currently comparing: