---
description: Review of ThreatLocker Software: system overview, features, price and cost information. Get free demos and compare to similar programs on Software Advice Ireland.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: ThreatLocker | Reviews, Pricing & Demos - SoftwareAdvice IE
---

Breadcrumb: [Home](/) > [Endpoint Protection Software](/directory/4777/endpoint-protection-software/software) > [ThreatLocker](/software/314278/threatlocker)

# ThreatLocker

Canonical: https://www.softwareadvice.ie/software/314278/threatlocker

Page: 1 / 5\
Next: [Next page](https://www.softwareadvice.ie/software/314278/threatlocker?page=2)

> Stop ransomware\! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlisting with Ringfencing app containment and storage policies to enable a Zero Trust posture and block attacks that live off the land.
> 
> Verdict: Rated **4.9/5** by 87 users. Top-rated for **Likelihood to recommend**.

-----

## Quick Stats & Ratings

| Metric | Rating | Detail |
| **Overall** | **4.9/5** | 87 Reviews |
| Ease of Use | 4.5/5 | Based on overall reviews |
| Customer Support | 4.9/5 | Based on overall reviews |
| Value for Money | 4.8/5 | Based on overall reviews |
| Features | 4.8/5 | Based on overall reviews |
| Recommendation percentage | 90% | (9/10 Likelihood to recommend) |

## About the vendor

- **Company**: ThreatLocker
- **Founded**: 2015

## Commercial Context

- **Starting Price**: US$0.01
- **Pricing model**: Per User (Free Trial)
- **Target Audience**: 2–10, 11–50, 51–200, 201–500, 501–1,000, 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop)
- **Supported Languages**: English
- **Available Countries**: Afghanistan, Albania, Algeria, American Samoa, Andorra, Angola, Anguilla, Antigua & Barbuda, Argentina, Armenia, Aruba, Australia, Austria, Azerbaijan, Bahamas, Bahrain, Bangladesh, Barbados, Belarus, Belgium and 206 more

## Features

- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Application Security
- Audit Trail
- Backup and Recovery
- Behavioural Analytics
- Configuration Management
- Continuous Monitoring
- Customisable Reports
- Data Security
- Device Management
- Endpoint Management
- Endpoint Protection Software

## Integrations (9 total)

- Auth0
- ConnectWise PSA
- Datto RMM
- HaloPSA
- IT Glue
- Kaseya BMS
- Okta
- ServiceNow
- Splunk Enterprise

## Support Options

- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat

## Category

- [Endpoint Protection Software](https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software)

## Related Categories

- [Endpoint Protection Software](https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software)
- [Privileged Access Management Software](https://www.softwareadvice.ie/directory/4241/privileged-access-management/software)
- [Endpoint Detection and Response Software](https://www.softwareadvice.ie/directory/3977/edr/software)
- [Computer Security Software](https://www.softwareadvice.ie/directory/4528/security/software)
- [Network Access Control (NAC) Software](https://www.softwareadvice.ie/directory/4433/network-access-control/software)

## Alternatives

1. [N-central](https://www.softwareadvice.ie/software/161863/solarwinds-n-central) — 4.1/5 (195 reviews)
2. [Cove Data Protection](https://www.softwareadvice.ie/software/171880/solarwinds-backup) — 4.7/5 (217 reviews)
3. [N-sight RMM](https://www.softwareadvice.ie/software/30397/solarwinds-remote) — 4.3/5 (194 reviews)
4. [Syncro](https://www.softwareadvice.ie/software/373866/syncro) — 4.6/5 (147 reviews)
5. [IT Glue](https://www.softwareadvice.ie/software/351312/it-glue) — 4.6/5 (331 reviews)

## Reviews

### "Environment Security with ThreatLocker" — 5.0/5

> **Surbhi** | *20 January 2025* | Information Technology & Services | Recommendation rating: 9.0/10
> 
> **Pros**: 1. Easily capture the vulnerable applications and blocked those.&#10;2. Very easy deployment of this security software.&#10;3. It provides a mobile application as well which is very convinient to give responses on alerts.
> 
> **Cons**: 1. To make changes in the already running environment , it is quite difficult.&#10;2. Very slow performance of this product observed.
> 
> It gives zero trust security to machines , very scalable to block the unwanted things. Difficult to make changes in production environment along with multiple access issues faced.

-----

### "Total Control and Peace of Mind – My Journey with ThreatLocker\!" — 4.0/5

> **Anonymous User** | *12 November 2025* | Logistics & Supply Chain | Recommendation rating: 7.0/10
> 
> **Pros**: I​‍​‌‍​‍‌ have been using ThreatLocker for several months, and it stands out as one of the most powerful cybersecurity tools in my toolkit. Its commitment to a Zero Trust model literally blew my mind. After the installation, I was amazed by how much control I actually had over the allowed applications and scripts on our systems. The whole thing was a total overhaul of how we do endpoint protection.&#10;\* Strong Zero Trust Protection: The “deny by default” strategy implemented by ThreatLocker gives absolute control over the operations of which applications and scripts, thus the likelihood of ransomware and malware attacks is drastically reduced.&#10;\* Powerful Application Allowlisting: The allowlisting capability is highly accurate and efficient — after the completion of the setup, it acts as a security layer that permits software to run only if they are pre-approved, thus providing unbeatable endpoint security.&#10;\* Ringfencing Technology: This technology helps the separation of the different functionalities of an application so that they cannot access data or other programs unless it is necessary, thus preventing lateral attacks and data leaks.&#10;\* Comprehensive Visibility: The control panel provides an accurate and up-to-the-minute picture of what each device is doing, thus facilitating monitoring and auditing ​‍​‌‍​‍‌considerably.
> 
> **Cons**: I​‍​‌‍​‍‌ encountered several issues with this platform.&#10;Initial Setup Complexity: The setup was quite overwhelming when I first started using ThreatLocker. While the platform offers a lot of control and customization, it still takes a considerable amount of time to understand and properly configure the policies.&#10;Learning Curve: The product implements a Zero Trust model; hence, it requires some technical background. A new admin or a small team without a dedicated IT staff might find it difficult initially.&#10;Frequent Policy Adjustments: Initially, I had to constantly adjust the settings to allow the legitimate applications, which was somewhat inconvenient until the system got familiar with our ​‍​‌‍​‍‌environment.
> 
> I​‍​‌‍​‍‌ really enjoyed working with ThreatLocker. It is a very effective tool to actually implement the concept of Zero Trust security — giving you full insight and control over what is happening in your environment. Once I got past the initial learning curve, it was really obvious to me how effectively it stops unauthorized applications and possible threats from getting started.&#10;The app's allowlisting and ringfencing functionalities have been a complete turnaround in how I deal with security. I don’t have to worry about new software or ransomware coming in, as everything that is running is what I have definitely ​‍​‌‍​‍‌approved.

-----

### "threatlocker vs the others" — 5.0/5

> **Verified Reviewer** | *20 December 2022* | Higher Education | Recommendation rating: 5.0/10
> 
> **Pros**: it is very easy to intall new policies. have very good looking interface it easy to use
> 
> **Cons**: really i dont have nothing negative about this

-----

### "ThreatLocker a Requirement for your Security Stack\!" — 5.0/5

> **Matthew** | *11 February 2025* | Information Technology & Services | Recommendation rating: 10.0/10
> 
> **Pros**: The Vendor Support has been Fantastic\! Their Application Control and Elevation Control has been a great addition to DiD Security Stack\! The ability to overwrite Microsoft Windows default UAC with ThreatLocker and give end users more control over apps that are approved to run is a huge help for those tools that require Admin writes just to function.
> 
> **Cons**: The ability to control the Tray settings and the ability to add customer popups to the Request Access popup is my least favorite part of the tool. It's pretty limited and doesn't allow much ability to customization options.
> 
> I've been using ThreatLocker for about four years now within our primary security stack, and it has been rock solid. We primarily use their Application Control function, but we have also demoed their EDR solution, which is incredibly strong and significantly lighter weight than other EDRs on the market.&#10;&#10;The Application Control portion has been amazing, provided you put in the effort to tune the software for the tools you use. Their engineers are great to work with, and I haven't had a bad experience with them to date. \[sensitive content hidden\] (engineer) and \[sensitive content hidden\] (Account Rep) have been fantastic at keeping us updated on what's coming and assisting with any issues that arise.&#10;&#10;The tool is incredibly stable on our endpoints, and we've only seen minor breaks on devices with crazy high uptimes. We manage over 7,700 endpoints, all containing ThreatLocker Application Control. We couldn't recommend this tool enough if you want to keep your endpoints safe. It has single-handedly saved customers from potential compromise due to the way it allows and denies applications.

-----

### "ThreatLocker is an outstanding product backed by an oustanding team" — 5.0/5

> **Paul** | *6 February 2025* | Information Technology & Services | Recommendation rating: 10.0/10
> 
> **Pros**: Overall it has been a fantastic experience the software and solution is solid and the support and team have been invaluable getting this implemented across our customer base.  Once properly implemented (which does take time and effort) it provides a controlled, safe environment and sets secure boundaries for our clients systems without the large performance overheads that so many other applications impose.&#10;&#10;The cost of Threatlocker and the time you need to provide to getting it set-up is absolutely worth it.  Not only does the application deliver peace of mind to the customer environments we have deployed it to, it also gives us confidence knowing they are safe and secure.  It ticks all the boxes for one of the biggest challenges out there and that's securing customers and meeting Cyber Security requirements.
> 
> **Cons**: I don't quite see this as a con personally but prospective customers need to be aware that this is a complex security tool which requires a large commitment of time and effort to get configured. It's not by any stretch of the imagination and tool that you just install and forget.
> 
> One of the best things about ThreatLocker is the don't just sell you the product and then leave you hanging without support or worst still charge you for the support after the initial sale like so many other companies.  To be honest it was a breath of fresh air in comparison to so many other companies.  They provide you with a dedicated team to ensure you get the most out of the product and that it runs optimally.  &#10;&#10;We were assigned a very kind chap \[sensitive content hidden\]  who deserves a huge shout out for his outstanding efforts and commitment to getting us up and running. Nothing was too much trouble he was on hand every step of the way helping us deliver ThreatLocker to all our customers but one in particular was a nightmare. Nonetheless \[sensitive content hidden\] rose to the challenge helping train, guide and often finding solutions to allowing some rather interesting applications coexist with ThreatLocker whilst securing the environment.  &#10;&#10;We are still very much on a journey with \[sensitive content hidden\] and the team at ThreatLocker but the hard work is most certainly paying off and we wouldn't hesitate recommending ThreatLocker to anyone.  The Cyber Hero team are available 24/7 and are always ready to help with any questions about the service or best practices and have now become an extension of our own team.

-----

Page: 1 / 5\
Next: [Next page](https://www.softwareadvice.ie/software/314278/threatlocker?page=2)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/software/314278/threatlocker)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/software/314278/threatlocker> |
| en | <https://www.softwareadvice.com/security/threatlocker-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/314278/threatlocker> |
| en-GB | <https://www.softwareadvice.co.uk/software/314278/threatlocker> |
| en-IE | <https://www.softwareadvice.ie/software/314278/threatlocker> |
| en-NZ | <https://www.softwareadvice.co.nz/software/314278/threatlocker> |
| fr | <https://www.softwareadvice.fr/software/314278/threatlocker> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.ie/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"ThreatLocker","description":"Stop ransomware! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlisting with Ringfencing app containment and storage policies to enable a Zero Trust posture and block attacks that live off the land.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/f9498ebb-5057-41ac-9d76-e4eda3c0ba81.png","url":"https://www.softwareadvice.ie/software/314278/threatlocker","@type":"SoftwareApplication","@id":"https://www.softwareadvice.ie/software/314278/threatlocker#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.9,"bestRating":5,"ratingCount":87},"offers":{"price":"0.01","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Apple, Windows"},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Protection Software","position":2,"item":"/directory/4777/endpoint-protection-software/software","@type":"ListItem"},{"name":"ThreatLocker","position":3,"item":"/software/314278/threatlocker","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/software/314278/threatlocker#breadcrumblist"}]}
</script>
