ThreatLocker is good for small business as it's application allowlisting provides strong zero-trust security and prevents unauthorized software and ransomware, which is crucial for small businesses were a data breach can be very devastating.
Although ThreatLocker does require initial setup and tuning for it to work properly and some people complain of poor performance with ThreatLocker.
The key benefits of ThreatLocker though are preventing unknown threats, having granular control over apps and storage, and compliance support, which makes ThreatLocker a valuable investment, even though it has potential initial configuration effort.
What ThreatLocker does is prevent malware, viruses and unauthorized software by blocking everything that is not explicitly allowed, (allowlisting) and controlling of application actions (ringfencing), working alongside traditional antivirus to create a secure environment.
An IT admin installs ThreatLocker and it might temporarily block legitimate apps until approved, but it's goal is to stop threats before they start and not cause harm.
ThreatLocker is great for robust endpoint security and offers strong application control and zero trust features which significantly boost protection against threats like ransomware, although you also have to commit significant time and effort for it's complex initial setup as well as ongoing management to get the maximum value and benefits from ThreatLocker.
ThreatLocker's value lies in it's granular control, stability and ability to prevent unauthorized code execution, although some also report that there's declining support quality post acquisition and note its complexity as a hurdle.
The disadvantages of ThreatLocker is the complex configuration and steep learning curve, which requires a great amount of effort and training to use properly, which can lead to potential implementation headaches as well as high maintenance for allow listing, slow dashboard performance and even inconsistent support, limited customization outside of it's core functions as well as the potential for blocking of software that is legitimate, which can also disrupt daily operations.
Users of ThreatLocker often find ThreatLocker powerful but also challenging to manage effectively, especially for complex environments, with some reports of feature gaps and also slow development on requests.
Users of ThreatLocker encounter roadblocks when they try to deviate from the original design or ask for specific features like import/export for storage control which are not prioritized.
And ThreatLocker can also block mission critical software or necessary updates, frustrating users and IT and improper setup of ThreatLocker can also create security gaps or block legitimate work.
ThreatLocker is legit and are also a highly regarded Zero Trust endpoint security platform.
ThreatLocker is also known for their robust application allowlisting, ringfencing, and even granular control over what runs on endpoints, effectively blocking malware and also unauthorized software.
Although some users of ThreatLocker note that there's a learning curve and occasional post acquisition support shifts.
ThreatLocker is also praised for empowering of IT with deep control, stopping threats at the source, and offer strong value even despite the complexity of initial setup and potential UI/reporting limitations.
The key strengths of ThreatLocker includes.
The effective zero trust which implements a strong "deny by default" policy, and prevents unauthorized apps, which include ransomware from running unless explicitly approved.
The strong application control, with features like Application Allowlisting and Ringfencing provide deep control, stopping of threats before they start and giving confidence which only approved software runs.
Comprehensive security adds layers like Elevation Control, Network Control and Storage Control, which enhances overall endpoint security beyond traditional antivirus.
And many MSPs and even IT professionals find ThreatLocker to be a powerful, stable and cost effective tool for securing diverse environments.
ThreatLocker is not a virus and instead is a robust cybersecurity solution designed to protect organizations by controlling and managing applications and devices.
ThreatLocker offers advanced security features that help protect against ransomware, malware, and other cyber threats.
Unlike antivirus or traditional EDR, ThreatLocker Allowlisting solution puts you in control of what software, scripts, executables, and libraries can run on your endpoints and servers.
This approach stops not only malicious software in its tracks but also stops other unpermitted applications from running.