ThreatLocker Overview

ThreatLocker is a network security software solution focused on protecting businesses from cyber threats through application whitelisting and access control. Designed for comprehensive network security, it offers unique features such as application ring-fencing and storage control, helping organizations restrict unauthorized access and secure critical data. ThreatLocker provides real-time visibility into applications and data flows across the network, allowing IT teams to define policies that minimize vulnerabilities. The software actively monitors all network activity, promptly detecting and blocking suspicious behavior. Easy to integrate and customize, ThreatLocker enhances protection against ransomware and malware, reducing risks to sensitive information. Its proactive approach to security ensures an additional layer of defense, making it a reliable choice for organizations of any size looking to secure their network infrastructure.

Read More

ThreatLocker Screenshot & Video

Contact Details

  • Vendor Name ThreatLocker
  • Founded 2015
  • Location United States

Support

  • 24x7 Support 24x7 Support
  • Email Email
  • Phone Phone
  • Chat Chat
  • Knowledge Base Knowledge Base
  • FAQs/Forum FAQs/Forum

Training

  • In-person In-person
  • Live Online Live Online
  • Webinar Webinar
  • Documentation Documentation
  • Videos Videos

Licensing & Deployment

  • Proprietary Proprietary
  • Cloud Hosted Cloud Hosted
  • Web-Based Web-Based

Typical Customers

  • Self-Employed Self-Employed
  • Small-Business Small-Business
  • Midsize-Business Midsize-Business

Languages Supported

English


Industries

Accounting, Information Technology & Services, Research

You May Also Like

Cisco DNA

Cisco DNA

Contact Vendor

Duo Security

Duo Security

$3 Per month

ESET Endpoint Security

ESET Endpoint Security

$211 Per year

Forcepoint Web Security

Forcepoint Web Security

Contact Vendor

ThreatLocker Features

  • Arrow Icon Endpoint Protection
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Security Auditing
  • Arrow Icon Real Time Monitoring
  • Arrow Icon Data Security
  • Arrow Icon Secure Data Storage
  • Arrow Icon Application Security
  • Arrow Icon Password Management
  • Arrow Icon Alerts/Escalation
  • Arrow Icon Anti Virus
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Network Security
  • Arrow Icon SSL Security
  • Arrow Icon Incident Management
  • Arrow Icon Server Monitoring
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Financial Data Protection
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Anti Spam
  • Arrow Icon Audit Trail
  • Arrow Icon Maintenance Scheduling
  • Arrow Icon Patch Management
  • Arrow Icon Threat Intelligence
  • Arrow Icon Threat Response
  • Arrow Icon VPN
  • Arrow Icon Encryption
  • Arrow Icon Firewalls
  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Compliance Management
  • Arrow Icon Policy Management
  • Arrow Icon Audit Trail
  • Arrow Icon Real Time Reporting
  • Arrow Icon Single Sign On
  • Arrow Icon Secure Data Storage
  • Arrow Icon Behavior Tracking
  • Arrow Icon Incident Management
  • Arrow Icon Activity Tracking
  • Arrow Icon SSL Security
  • Arrow Icon Patch Management
  • Arrow Icon Endpoint Protection
  • Arrow Icon Risk Alerts
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Security Auditing
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Event Logs
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Server Monitoring
  • Arrow Icon Anti Virus
  • Arrow Icon Authentication
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Two-Factor Authentication
  • Arrow Icon Threat Response
  • Arrow Icon Data Security
  • Arrow Icon Firewalls
  • Arrow Icon Help Desk Management
  • Arrow Icon Event Logs
  • Arrow Icon CRM
  • Arrow Icon Activity Tracking
  • Arrow Icon Server Monitoring
  • Arrow Icon Issue Management
  • Arrow Icon Self Service Portal
  • Arrow Icon Billing & Invoicing
  • Arrow Icon Configuration Management
  • Arrow Icon Dashboard
  • Arrow Icon Compliance Management
  • Arrow Icon Real Time Updates
  • Arrow Icon Project Management
  • Arrow Icon Patch Management
  • Arrow Icon SLA Management
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Backup and Recovery
  • Arrow Icon Inventory Management
  • Arrow Icon Support Ticket Management
  • Arrow Icon Incident Management
  • Arrow Icon Maintenance Scheduling
  • Arrow Icon Policy Management
  • Arrow Icon Anti Virus
  • Arrow Icon IT Asset Tracking
  • Arrow Icon Task Management
  • Arrow Icon Real Time Analytics
  • Arrow Icon Performance Metrics
  • Arrow Icon Active Directory Integration
  • Arrow Icon Contract/License Management
  • Arrow Icon Application Security
  • Arrow Icon Alerts/Escalation
  • Arrow Icon Real Time Reporting
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Incident Management
  • Arrow Icon Secure Data Storage
  • Arrow Icon Compliance Management
  • Arrow Icon Patch Management
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Risk Analysis
  • Arrow Icon Policy Management
  • Arrow Icon User Management
  • Arrow Icon Encryption
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Server Monitoring
  • Arrow Icon Event Logs
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Device Management
  • Arrow Icon Web Threat Management
  • Arrow Icon Security Auditing
  • Arrow Icon Monitoring
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon Threat Response
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon Root Cause Analysis
  • Arrow Icon Remediation Management
  • Arrow Icon Prioritization
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Continuous Monitoring
  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Policy Creation
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Profiling
  • Arrow Icon Multiple Authentication Methods
  • Arrow Icon Dashboard
  • Arrow Icon Remote Access/Control
  • Arrow Icon Multi-Device Support
  • Arrow Icon Intrusion Prevention System
  • Arrow Icon Policy Management
  • Arrow Icon Threat Response
  • Arrow Icon Event Logs
  • Arrow Icon VPN
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Activity Monitoring
  • Arrow Icon Audit Trail
  • Arrow Icon Patch Management
  • Arrow Icon Compliance Management
  • Arrow Icon Firewalls
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Risk Alerts
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Anti Virus
  • Arrow Icon Threat Intelligence
  • Arrow Icon Multi-Factor Authentication
  • Arrow Icon Application Access Control
  • Arrow Icon Credential Management
  • Arrow Icon Remote Access Management
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Password Management
  • Arrow Icon Policy Management
  • Arrow Icon Compliance Management
  • Arrow Icon Behavioral Analytics
  • Arrow Icon User Activity Monitoring
  • Arrow Icon Access Management
  • Arrow Icon User Session Management

ThreatLocker Pricing

Pricing Type

  • Pricing Type Per User

Preferred Currency

  • USD ($) USD ($)

Free Trial

  • Free Trial Available

Free Version

  • NA

Payment Frequency

  • NA

Plans & Packages

Basic

$0.01 Per User

ThreatLocker FAQs

ThreatLocker is a network security software solution focused on protecting businesses from cyber threats through application whitelisting and access control. Designed for comprehensive network security, it offers unique features such as application ring-fencing and storage control, helping organizations restrict unauthorized access and secure critical data. ThreatLocker provides real-time visibility into applications and data flows across the network, allowing IT teams to define policies that minimize vulnerabilities. The software actively monitors all network activity, promptly detecting and blocking suspicious behavior. Easy to integrate and customize, ThreatLocker enhances protection against ransomware and malware, reducing risks to sensitive information. Its proactive approach to security ensures an additional layer of defense, making it a reliable choice for organizations of any size looking to secure their network infrastructure.

  • No, ThreatLocker does not offer a free version.

  • Yes, ThreatLocker offers a free trial.

  • No, Credit Card details are not required for the ThreatLocker trial.

  • ThreatLocker offers the following pricing plans & packages:

    Basic

    $0.01 Per User

  • No, ThreatLocker does not offer an API.

  • ThreatLocker offers support with the following options:
    • 24x7 Support , Email , Phone , Chat , Knowledge Base , FAQs/Forum

  • ThreatLocker offers training with the following options:
    • In-person , Live Online , Webinar , Documentation , Videos

  • ThreatLocker supports the following languages:
    • English

  • Following are the typical users of the ThreatLocker:
    • Self-Employed , Small-Business , Midsize-Business

  • ThreatLocker supports the following deployment:
    • Cloud Hosted

  • ThreatLocker supports the following devices and operating systems:
    • Web-Based

ThreatLocker Comparisons

ThreatLocker vs Cisco AnyConnect

ThreatLocker vs ESET Endpoint Security

ThreatLocker vs ESET Home Office Security Pack

ThreatLocker vs Malwarebytes for Business

ThreatLocker vs Bitdefender GravityZone

ThreatLocker vs Splunk Enterprise

ThreatLocker vs Adguard

ThreatLocker vs Webroot Business Endpoint Protection

ThreatLocker vs ManageEngine Password Manager Pro

ThreatLocker vs ManageEngine Network Configuration Manager

ThreatLocker vs Jamf Protect

ThreatLocker vs Falcon LogScale

ThreatLocker vs Ivanti Connect Secure

ThreatLocker vs Heimdal Threat Prevention

ThreatLocker vs SUPERAntiSpyware

ThreatLocker vs WatchGuard Endpoint Security

ThreatLocker vs ConnectWise SIEM

ThreatLocker vs JumpCloud

ThreatLocker vs UTunnel VPN

ThreatLocker vs Access Control Manager