Capterra Logo
Helping businesses choose better software since 1999

ThreatLocker vs Hackrate: Which is a better fit?

Updated on November 17th, 2024
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Summary
Key features rated by users
Features selected based on 1,252 reviews from Cybersecurity users.
% Fit
Missing features
Not enough reviews
Feature ratings
Anti Virus
NA
Threat Response
4.8
Firewalls
4.6
Real-Time Monitoring
5.0
Vulnerability Scanning
NA
% Fit
Missing features
Not enough reviews
Feature ratings
Anti Virus
NA
Threat Response
--
Firewalls
NA
Real-Time Monitoring
NA
Vulnerability Scanning
4.8
User satisfaction
4.9
User reviews76
Ease of use
4.5
Functionality
4.8
Value for money
4.9
Customer support
4.9
5.0
User reviews21
Ease of use
4.9
Functionality
4.8
Value for money
5.0
Customer support
4.9
Price starts from
/user
Not provided by vendor
Free version
Free trial
Monthly subscription
Free version
Free trial
Best for

Industries and businesses of all sizes looking to enable Zero Trust posture cybersecurity.

Designed for businesses of all sizes. Our platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects.

User reviews
pros & cons
1 / 4
View Reviews
1 / 4
View Reviews
Video reviews
Daniel V
CEO
5.0

Speaker 1: Hi, I'm Daniel, CEO of Unique IT Pro. We're about 12 deep and my rating for ThreatLocker is a five. So before ThreatLocker, we used to just rely on basically taking away the local admin permission, not allowing users to have local admin. But we had a lot of challenges with people wanting that permission because they couldn't do things like install printers at home. So it was very challenging and it wasn't protecting. It was just a step in the right direction. But we're glad ThreatLocker came along. So when I basically was introduced to ThreatLocker, the application Whitelisting, the Elevation Control, those two made it a no-brainer for me to go with ThreatLocker. But then the additional stuff such as Ring Fencing, basically the ability to keep applications in their own lane and to use storage control. And when you look at ThreatLocker today and how they've evolved, I'm so happy that I selected ThreatLocker a few years ago. Going into any new solution, you always worry about not having the engineers and the time to take on such a solution, but ThreatLocker's onboarding where you spend some time with their engineer, it just made it so easy. We deployed. We met with him. Then we had a review 30 days later to secure the systems and he explained everything through the unified audit logs. And it just seemed like a blink of an eye, he was already using ThreatLocker internally and we were so ready to go to market. My advice to those considering ThreatLocker is it does so much. Don't feel overwhelmed. Don't feel like it's going to be too noisy. You got to go into it one component at a time. Do like we did. We did our test lab, then we did our internal systems before we got our feet wet with it, before we were ready to start taking on our clients. So I think you have to have that type of approach, phase into it, and don't try to just do the whole thing. Have your appetizer first before you get to your entree.

How Capterra sources reviews
View all video reviews
No video reviews yet
User interface
195434 video thumbnail}
1 Video
No videos provided by vendor
195434
1 screenshot
238260
4 screenshots

ThreatLocker

Top Features
20/50
  • Activity Monitoring
  • AI/Machine Learning
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Tracking
  • Collaboration Tools
  • Compliance Management
  • Data Security
  • Data Visualization
  • DDoS Protection
  • Endpoint Management
  • Endpoint Protection
  • Firewalls
  • Incident Management
  • IOC Verification
  • Password Management
  • PCI Compliance
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Secure Data Storage
  • Single Sign On
  • SSL Security
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • API
  • Behavioral Analytics
  • Event Logs
  • HIPAA Compliant
  • Monitoring
  • Patch Management
  • Policy Management
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remote Monitoring & Management
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Third-Party Integrations
  • Threat Response
See All features
Hide Cybersecurity Software Features -

Hackrate

12/50
Show Cybersecurity Software Features +

ThreatLocker

  • Best Value Endpoint Protection
    Software (2024)

Hackrate

  • Best Value Cybersecurity
    Software (2022)
ThreatLocker
Deployment
  • Cloud, SaaS, Web-Based
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
Support
  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Training
  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos
Hackrate
Deployment
  • Cloud, SaaS, Web-Based
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
Support
  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Training
  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos
ThreatLocker
  • By ThreatLocker
  • Located in United States
  • Founded in 2015
Hackrate
  • By Hackrate
  • Located in Hungary
Recommendations

Products similar to those you're currently comparing: