Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
Capterra carefully verified over 2 million reviews to bring you authentic software and services experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. Learn more.
Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software and service providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. Learn more.
Industries and businesses of all sizes looking to enable Zero Trust posture cybersecurity.
Designed for businesses of all sizes. Our platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects.
What I like the most is the ThreatLocker support, it's excellent. Most of my questions have been answered through the university or the help page.
You can get lost in there! when dealing with software devleopers or engineers, it can seem to restrictive.
The cost of this tool and the time to set it up is worth it. This tool gives us a fantastic peace of mind in environments we have it deployed in.
Threatlocker is not a set it and forget it product.
My experience with ThreatLocker has been particularly positive, largely due to the outstanding technical support they offer.
It will stop anything and everything that either isn't allowed to run or it doesn't recognize.
It’s the best product out there for application whitelisting. It’s easy to use, it’s MSP friendly, has some of the best support I’ve ever experienced from a vendor.
It will restrict access on installing or executing apps you don't want.
I'm pleased to have the opportunity to be a part of a Hungarian BugBounty platform. During the years I spent with BB on various platforms, I can say that Hackrate has really quick response time.
Small number of bug bounty programs. They are using CAPEC instead of CWE, it was a bit strange for me at the first time, but it is very similar in most of the cases.
An ethical hacking platform with a great price-value proposal.
I have not experienced any quality weakness of the product.
I like the mVDP form and the JIRA integration the most, in addition to the basic features, they are useful for me.
The first project was really meeting our expectations, maybe we set too high expectations as we were expecting the majority of the vulnerabilities within one week.
The Hackrate platform is easy to use and provides a great coverage to discover vulnerabilities in software. They are continuously expanding their researcher community.
I can't really think of anything I don't like about the platform.
Speaker 1: Hi, I'm Daniel, CEO of Unique IT Pro. We're about 12 deep and my rating for ThreatLocker is a five. So before ThreatLocker, we used to just rely on basically taking away the local admin permission, not allowing users to have local admin. But we had a lot of challenges with people wanting that permission because they couldn't do things like install printers at home. So it was very challenging and it wasn't protecting. It was just a step in the right direction. But we're glad ThreatLocker came along. So when I basically was introduced to ThreatLocker, the application Whitelisting, the Elevation Control, those two made it a no-brainer for me to go with ThreatLocker. But then the additional stuff such as Ring Fencing, basically the ability to keep applications in their own lane and to use storage control. And when you look at ThreatLocker today and how they've evolved, I'm so happy that I selected ThreatLocker a few years ago. Going into any new solution, you always worry about not having the engineers and the time to take on such a solution, but ThreatLocker's onboarding where you spend some time with their engineer, it just made it so easy. We deployed. We met with him. Then we had a review 30 days later to secure the systems and he explained everything through the unified audit logs. And it just seemed like a blink of an eye, he was already using ThreatLocker internally and we were so ready to go to market. My advice to those considering ThreatLocker is it does so much. Don't feel overwhelmed. Don't feel like it's going to be too noisy. You got to go into it one component at a time. Do like we did. We did our test lab, then we did our internal systems before we got our feet wet with it, before we were ready to start taking on our clients. So I think you have to have that type of approach, phase into it, and don't try to just do the whole thing. Have your appetizer first before you get to your entree.
ThreatLocker
Top FeaturesHackrate
ThreatLocker
Hackrate
Products similar to those you're currently comparing: