Capterra Logo
Helping businesses choose better software since 1999

ThreatLocker vs TypingDNA ActiveLock: Which is a better fit?

Updated on November 17th, 2024
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
What's your intended use case?
Summary
Key features rated by users
Features selected based on 1,153 reviews from Endpoint Protection users.
% Fit
Not enough reviews
Feature ratings
Patch Management
4.0
Anomaly/Malware Detection
4.7
Real-Time Monitoring
5.0
Monitoring
5.0
Alerts/Notifications
4.7
% Fit
Missing features
Not enough reviews
Feature ratings
Patch Management
NA
Anomaly/Malware Detection
5.0
Real-Time Monitoring
4.9
Monitoring
NA
Alerts/Notifications
4.0
User satisfaction
4.9
User reviews76
Ease of use
4.5
Functionality
4.8
Value for money
4.9
Customer support
4.9
4.6
User reviews11
Ease of use
4.3
Functionality
4.7
Value for money
4.5
Customer support
4.8
Price starts from
/user
Not provided by vendor
Free version
Free trial
--
Yearly subscription
Free version
Free trial
Best for

Industries and businesses of all sizes looking to enable Zero Trust posture cybersecurity.

Cybersecurity experts, IT professionals, CISO, Chief Compliance Officer, Chief Risk Officer

User reviews
pros & cons
1 / 4
View Reviews
Not enough reviews
View Reviews
Video reviews
Daniel V
CEO
5.0

Speaker 1: Hi, I'm Daniel, CEO of Unique IT Pro. We're about 12 deep and my rating for ThreatLocker is a five. So before ThreatLocker, we used to just rely on basically taking away the local admin permission, not allowing users to have local admin. But we had a lot of challenges with people wanting that permission because they couldn't do things like install printers at home. So it was very challenging and it wasn't protecting. It was just a step in the right direction. But we're glad ThreatLocker came along. So when I basically was introduced to ThreatLocker, the application Whitelisting, the Elevation Control, those two made it a no-brainer for me to go with ThreatLocker. But then the additional stuff such as Ring Fencing, basically the ability to keep applications in their own lane and to use storage control. And when you look at ThreatLocker today and how they've evolved, I'm so happy that I selected ThreatLocker a few years ago. Going into any new solution, you always worry about not having the engineers and the time to take on such a solution, but ThreatLocker's onboarding where you spend some time with their engineer, it just made it so easy. We deployed. We met with him. Then we had a review 30 days later to secure the systems and he explained everything through the unified audit logs. And it just seemed like a blink of an eye, he was already using ThreatLocker internally and we were so ready to go to market. My advice to those considering ThreatLocker is it does so much. Don't feel overwhelmed. Don't feel like it's going to be too noisy. You got to go into it one component at a time. Do like we did. We did our test lab, then we did our internal systems before we got our feet wet with it, before we were ready to start taking on our clients. So I think you have to have that type of approach, phase into it, and don't try to just do the whole thing. Have your appetizer first before you get to your entree.

How Capterra sources reviews
View all video reviews
No video reviews yet
User interface
195434 video thumbnail}
1 Video
No videos provided by vendor
195434
1 screenshot
251554
4 screenshots

ThreatLocker

Top Features
27/38
  • Compliance Management
  • Data Visualization
  • Encryption
  • Incident Management
  • Risk Analysis
  • Secure Data Storage
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • API
  • Application Security
  • Behavioral Analytics
  • Customizable Reports
  • Device Management
  • Event Logs
  • HIPAA Compliant
  • Monitoring
  • Patch Management
  • Policy Management
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Summary Reports
  • Third-Party Integrations
  • Threat Response
See All features
Hide Endpoint Protection Software Features -

TypingDNA ActiveLock

13/38
Show Endpoint Protection Software Features +

ThreatLocker

  • Best Value Endpoint Protection
    Software (2024)

TypingDNA ActiveLock

--

ThreatLocker
Deployment
  • Cloud, SaaS, Web-Based
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
Support
  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Training
  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos
TypingDNA ActiveLock
Deployment
  • Cloud, SaaS, Web-Based
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
Support
  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Training
  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos
ThreatLocker
  • By ThreatLocker
  • Located in United States
  • Founded in 2015
TypingDNA ActiveLock
  • By TypingDNA
  • Located in United States
Recommendations

Products similar to those you're currently comparing: