App comparison
Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Our commitment
Independent research methodology
Our researchers use a mix of verified reviews, independent research, and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
Verified user reviews
GetApp maintains a proprietary database of millions of in-depth, verified user reviews across thousands of products in hundreds of software categories. Our data scientists apply advanced modeling techniques to identify key insights about products based on those reviews. We may also share aggregated ratings and select excerpts from those reviews throughout our site.
Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.
How GetApp ensures transparency
GetApp lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. GetApp is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website.

ThreatLocker
Based on GetApp‘s extensive, proprietary database of in-depth, verified user reviews
Zero trust cybersecurity platform for enterprise
Table of Contents
ThreatLocker - 2026 Pricing, Features, Reviews & Alternatives


All user reviews are verified by in-house moderators and provider data by our software research team. Learn more
Last updated: February 2026
ThreatLocker overview
What is ThreatLocker?
ThreatLocker is a Zero Trust cybersecurity platform that delivers comprehensive security through a default deny approach. The platform allows only trusted software to execute and blocks all other code by default. It is designed for organizations in financial services, healthcare, government, education, manufacturing and managed service provider environments that require strict application and device access controls.
The platform’s foundation is allowlisting, which automatically permits approved applications while preventing execution of unapproved or malicious software. Ringfencing technology isolates application processes by restricting their access to files, registry keys, network resources and other system components. Network control provides granular management of traffic by enabling administrators to limit connections by port, source address or dynamic access lists. Additional components include privilege management through elevation control, device access policies through storage control and protection of cloud applications through cloud control. Defense against configuration attacks strengthens security by preventing unauthorized changes to system settings.
Automated learning mode supports policy creation by observing application behavior and generating initial allowlist entries while a testing environment enables safe validation of security rules prior to enforcement. Unified audit consolidates detailed logs of system activity for compliance and investigation purposes. A centralized cloud-based management console facilitates policy enforcement and real-time monitoring across all endpoints. The open application programming interface framework supports integration with third-party security tools, security information and event management platforms and IT management systems to maintain a cohesive security architecture.
ThreatLocker supports diverse operating systems including Windows, macOS and Linux and aligns with regulatory frameworks such as NIST, HIPAA, CIS, PCI and the Essential Eight. The Cyber Hero managed detection and response service extends the platform with around the clock support from security experts. Organizations benefit from continuous monitoring, rapid incident response and strategic guidance to maintain security posture across distributed environments.
Key benefits of using ThreatLocker
Starting price
Alternatives
with better value for money
Pros & Cons

Security and Access Control
Customer Support
Team and Onboarding Process
Sales and Vendor Relations
ThreatLocker’s user interface
ThreatLocker pros, cons and reviews insights
To determine these pros and cons insights, we analyzed responses from
Overall rating
Value for money
4.8
Features
4.8
Ease of use
4.5
Customer support
4.9
Reviews sentiment
What do users say about ThreatLocker?
Ringfencing Technology: This technology helps the separation of the different functionalities of an application so that they cannot access data or other programs unless it is necessary, thus preventing lateral attacks and data leaks.
Select to learn more
Who uses ThreatLocker?
Based on 87 verified user reviews.
Company size
Small Businesses
Enterprises
Midsize Businesses
Top industries
Use cases
ThreatLocker's key features
Most critical features, based on insights from ThreatLocker users:
All ThreatLocker features
Features rating:
ThreatLocker awards
ThreatLocker alternatives
ThreatLocker pricing
Value for money rating:
Starting from
0.01
/user
User opinions about ThreatLocker price and value
Value for money rating:
To see what individual users think of ThreatLocker's price and value, check out the review snippets below.
Richard B.
Network Engineer
Anthony G.
President
ThreatLocker integrations (12)
Integrations rated by users
We looked at 87 user reviews to identify which products are mentioned as ThreatLocker integrations and how users feel about them.
Integration rating: 3.0 (2)
“This integration seemed to perpetually write a TON of activity into the ITG database even during our initial trial period with limited rollout. I disabled this integration prior to the MSP fleet rollout.”
“Integration and reporting with ITGlue for documentation is extremely useful. ”
Chris G.
Sr. Systems Administrator
Integration rating: 5.0 (1)
“Integration with our ticketing system is important for tracking requests and metrics for our team.”
Richard B.
Network Engineer
Integration rating: 2.0 (1)
“Canned deployment script is less than useful, wrote my own custom AMP service to deploy and monitor in-one.”
Chris G.
Sr. Systems Administrator
Integration rating: 4.7 (3)
Integration rating: 5.0 (2)
Other top integrations
ThreatLocker customer support
What do users say about ThreatLocker customer support?
Customer support rating:
We analyzed 30 verified user reviews to identify positive and negative aspects of ThreatLocker customer support.
Widespread user sentiment highlights ThreatLocker's support as highly responsive, knowledgeable, and quick to resolve issues.
A significant portion of users appreciate always-available 24/7 support and regular check-ins that feel like an extension of their team.
Multiple users report that support goes above and beyond, offering patient guidance and clear communication throughout implementation.
Support options
Training options
To see what individual users say about ThreatLocker's customer support, check out the review snippets below.
“ThreatLocker's features and responsive support make it a solution that we will continue to use to safeguard our customers from mayhem caused by supply chain attacks, user ignorance, or compromises of our tools used to manage our customers.”
Anthony G.
President
“One of the best things about ThreatLocker is the don't just sell you the product and then leave you hanging without support or worst still charge you for the support after the initial sale like so many other companies. ”
Paul W.
Director
“The maintenance goes down with some time and fine tuning, but it will never be a product where you set it and forget it. But I think the company is aware of that which is why they've built a strong and quick to respond support organization,”
Bill S.
Director of Information Technology and Security
ThreatLocker FAQs
ThreatLocker has the following typical customers:
Large Enterprises, Mid Size Business, Non Profit, Public Administrations, Small Business
These products have better value for money
Q. What languages does ThreatLocker support?
ThreatLocker supports the following languages:
English
Q. Does ThreatLocker offer an API?
Yes, ThreatLocker has an API available for use.
Q. What level of support does ThreatLocker offer?
ThreatLocker offers the following support options:
24/7 (Live rep), Knowledge Base, Email/Help Desk, Chat, Phone Support, FAQs/Forum













