TrustRadius: an HG Insights company

ThreatLocker

Score9.4 out of 10

20 Reviews and Ratings

What is ThreatLocker?

ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic.

Media

ThreatLocker

Top Performing Features

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.6

  • Hybrid Deployment Support

    Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.

    Category average: 8.3

  • Infection Remediation

    Capability to quarantine infected endpoint and terminate malicious processes.

    Category average: 8.8

Areas for Improvement

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 9.1

  • Centralized Management

    Centralized management supporting multi-factor authentication, customized views, and role-based access control.

    Category average: 8.5

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.3

Threatlocker review.

Use Cases and Deployment Scope

We use Threatlocker to analyze the most frequently used programs by users and block any unauthorized programs for more automated control and security. It is a good way for us not to have to worry about any unknown software in our client environments and shows that we are actively monitoring such things.

Pros

  • Support is fast and responsive.
  • Very good at its intended purpose.
  • Testing environment is very useful.

Cons

  • Some programs that are known come up as blocked time to time.
  • It has a difficult time recognizing safe driver installations.
  • The different modes can be expanded on.

Return on Investment

  • It allowed us to bundle it with our security bundle.
  • Allows us to show activity of hours worked monitoring systems.
  • Allowed us to show higher ups users who try to install unauthorized programs.

Usability

Alternatives Considered

Webroot Antivirus + Internet Security Complete (SecureAnywhere) and Windows Server

Other Software Used

Microsoft Entra ID, Webroot Endpoint Protection, Microsoft Defender Threat Intelligence

ThreatLocker the Zero Trust system you didn't know you needed.

Use Cases and Deployment Scope

ThreatLocker is used on every endpoint and server in our business. The software's functionality allows us to apply a zero-trust principle to all areas of our internal systems. We use the software to block any applications outside of the scope of our pre-approved applications. Further, we use network control to block client-to-client or client-to-server connections on unnecessary protocols. We also use the config manager to apply policies into our environment that we would have traditionally had to build manually in group policy, allowing us to roll out policies company-wide or to specific groups. Anything that tries to breach these policies immediately alerts us, and as such, we can understand what is going on behind the scenes on our network and what users are trying to run versus what they are allowed to run. The picture this paints is invaluable for our confidence in a smooth operation.

Pros

  • Application whitelisting.
  • Unified audits of everything network & application.
  • Clean and concise portal to manage the same.
  • Dynamic ability to allow users to request more apps.
  • Security and a sense of complete control.

Cons

  • I don't honestly know of any areas they could improve.

Return on Investment

  • Saves hours of technician time.
  • Is a good price for the value it brings.
  • Prevents unwanted applications from running in our environment.

Usability

Other Software Used

Cybereason Managed Detection & Response (MDR)

ThreatLocker - Peace of Mind

Use Cases and Deployment Scope

We use ThreatLocker setup to provide Application control, Storage control and Elevation Control. App control allows to prevent the execution of non-approved applications. Storage control provides the ability to require that only encrypted USB devices are used unless otherwise allowed. Elevation control lets us dictate which applications can be run as administrator meaning we no longer have to allow a given user to have local admin rights.

Pros

  • Application Control
  • Elevation Control
  • Storage Control

Cons

  • None
  • None
  • None

Return on Investment

  • ThreatLocker has significantly increased our security posture by blocking execution of unwanted software.
  • Not having to make end users local admins limits an attackers ability to conduct malicious activity.

Usability

Alternatives Considered

Tanium

ThreatLocker is an essential application to our Cyber Security Stack

Use Cases and Deployment Scope

We use ThreatLocker to allow us to deploy application control and network hardening. especially for backup hosts. we use it to comply with essential 8. Without it we would greatly struggle, and ThreatLocker has made its really easy to achieve the required maturity level the client requires.

Pros

  • Application Control
  • Network Storage lockdown
  • Auditing

Cons

  • Reporting
  • easier UI

Return on Investment

  • easy sell to clients
  • great addition to cyber security stack

Usability

Other Software Used

N-able N-central, NinjaOne, Datto RMM, Keepit, Sendmarc, dmarcian

ThreatLocker a must have in your Security Stack!

Use Cases and Deployment Scope

We are an MSSP that needed an Application Control tool for a good price since we offer this tool to all size companies. This tool met our requirements both on price and on function of what it offers. It provides a solid replacement for UAC and provided a way to limit what users install on their devices.

Pros

  • Vendor Support is top notch. Quick response times and incredibly easy to talk to.
  • Application Control when tuned properly works exactly as you would expect. Giving your Internal IT and MSPs complete control over what is allowed in the environment.
  • Easy Deployment with an RMM via their stub installers
  • Integration with most PSA systems allowing automatic ticket closures when the CyberHeros work something before your team can get to it. (~5 mins)

Cons

  • Customization of the Tray and Pop ups
  • More control for the Cyber Heros for Apps that are approved
  • NA

Return on Investment

  • Applications that are new to the environment can be blocked even if they are wanted. Which can cause strain on the environment if not properly tuned or prepped.
  • We have this deployed onto around 7700 endpoints at this moment with less than 0.01% of issues with the agent or its functionality being noted. It's incredibly stable and the Vendor support further helps if it does break, and they can usually fix it without 15 mins.
  • We have had this tool on customers, and it has single handedly stopped Ransomware attacks by itself when the customers previous EDR failed to catch threat actor attacks. I can remember 3 separate instances where someone did something to cause an attack and ThreatLocker brought it to a screeching halt due to the application control and built-in ringfencing it provides.

Usability

Alternatives Considered

SentinelOne Singularity

Other Software Used

SentinelOne Purple AI, Cisco Umbrella, Datto Workplace