Rating
4.9
88 reviews
Categories
8
Founded
2017
Employees
800
Funding
366.5M
Venture (Round not Specified)
For IT Professionals to stop ransomware, you need to do more than just look for threats. ThreatLocker® helps reduce your surface area of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, ThreatLocker® network security solutions help enhance your Zero Trust protection and block attacks that live off the land.
Ad spend / mo
$967K
135 paid keywords
Paid visits / mo
1,835
Organic keywords
7,521
Organic visits / mo
14,314
Authority
41
3,369 ref domains
Creatives run
100
as THREATLOCKER, INC.
Active now
7
last 14 days
Advertising since
Nov 2024
1.5+ yrs running
Last seen
today
still active
Running 24 ads on LinkedIn as ThreatLocker - a paid B2B channel, on top of any Google/Capterra spend.
The shared messaging across Cybersecurity Posture & Vulnerability Management advertisers - the validated angles to copy. See the niche →
(88 reviews)
ThreatLocker has been effective for tightening security and managing application access across devices. It offers strong protection, good performance, and helpful support. While setup and policy tuning can take some effort, the overall experience is secure, stable, and dependable.
Pros: Strong security controls, reliable malware protection, and clear visibility over application access. Performance is solid, and deployment is straightforward once configured.
Cons: Initial setup can feel complex, and some policy adjustments require more time than expected. Occasional false positives may interrupt workflows.
Anonymous User · Analyst · Financial Services · April 16, 2026
Pros: ThreatLocker is a major partner/vendor of ours, and for good reason; they are dependable and cutting-edge when it comes to their services.
Cons: Protection comes at a price, but the premium is worth the investment. They are very responsive and do regular updates.
Craig T. · Director of Marketing · Information Technology and Services · March 3, 2026
| Category | Page | Rank | Placement |
|---|---|---|---|
| Network Access Control (NAC) | 1 | 7 | - |
| Endpoint Detection and Response | 1 | 22 |
Domain confidence 100%
| Keyword they bid on | CPC | Pos | % budget | Landing page |
|---|
Whitelisting Software | Allow Only What You Need
Take a default-deny approach & block all software that is not explicitly permitted. Stop ransomware in it tracks by blocking all untrusted software.
https://www.threatlocker.com
Application Allowlisting Tool | Allow Only What You Need
Take a default-deny approach & block all software that is not explicitly permitted. Stop...
https://www.threatlocker.com
Application Allowlisting Tool | Allow Only What You Need
Gain control over your environment. If it's not expressly permitted, it's not allowed. Stop ransomware in it tracks by blocking all untrusted software.
https://www.threatlocker.com
Allowlisting Solution - Allow Only What You Need
Take a default-deny approach & block all software that is not explicitly permitted.
https://www.threatlocker.com
Application Allowlisting Tool | Allow Only What You Need
Take a default-deny approach & block all software that is not explicitly permitted. Stop ransomware in it tracks by blocking all untrusted software.
https://www.threatlocker.com
It uses AI/ML based detection to identify advanced threats, so the really bad zero-day stuff is actually being identified prior to it causing damage. Our endpoints are running with healthy malware drag and we have fewer complaints from everyone in the watercooler. It's providing us a perfectly clear view into what our devices are doing 100% of the time, which is now million times easier than was before and we can instantly act on that data after doing a search instead of waiting an hour for it all to roll in.
Pros: Honestly, CrowdStrike Falcon really does work, which is a miracle. The agent is extremely lightweight, so you don’t even realize it is there, unlike the Trellix product we used in the past, which would completely bog down our systems. Thank God. Real time detection is the big draw here, it caught a suspicious PowerShell script running on an endpoint and we were able to see the full nasty timeline in real time. You have that one lightweight agent (which is a great thing) so you do not have a bunch of disjointed pieces to deal with and the fact that it is cloud based means your responses will be that much faster.
Cons: The management dashboard is a complete disaster, it is far too complex and I truly believe that new users will think they are reading a foreign language. How often do the marketplace apps for vendor integrations go out of date at exactly the moment you need them? I wasted an entire day trying to get an integration to work for a proof of concept because the app I was using was outdated, which is infuriating.
Tatsiana K. · Manager · Computer Software · December 8, 2025
I really enjoyed working with ThreatLocker. It is a very effective tool to actually implement the concept of Zero Trust security — giving you full insight and control over what is happening in your environment. Once I got past the initial learning curve, it was really obvious to me how effectively it stops unauthorized applications and possible threats from getting started. The app's allowlisting and ringfencing functionalities have been a complete turnaround in how I deal with security. I don’t have to worry about new software or ransomware coming in, as everything that is running is what I have definitely approved.
Pros: $92
Cons: I encountered several issues with this platform. Initial Setup Complexity: The setup was quite overwhelming when I first started using ThreatLocker. While the platform offers a lot of control and customization, it still takes a considerable amount of time to understand and properly configure the policies. Learning Curve: The product implements a Zero Trust model; hence, it requires some technical background. A new admin or a small team without a dedicated IT staff might find it difficult initially. Frequent Policy Adjustments: Initially, I had to constantly adjust the settings to allow the legitimate applications, which was somewhat inconvenient until the system got familiar with our environment.
Anonymous User · NETWORK ENGINEER · Logistics and Supply Chain · November 12, 2025
It ensures zero-trust machine security and scales efficiently to prevent unwanted actions, though modifying the production environment is complex and prone to access challenges.
Pros: 1. Easily identify vulnerable applications and block them. 2. The deployment of this security software is very simple. 3. It also offers a mobile app, making it convenient to respond to alerts.
Cons: 1. Making changes in an existing running environment is quite challenging. 2. The product has been observed to perform very slowly.
Collins I. · Manager · Information Technology and Services · November 10, 2025
I’ve had to re ask if I could open a website before because I was unaware that I had to type in a reason. So my request was just automatically denied but never was told to me it was. I waited a long time to be able to finish my work.
Pros: I like that I my computer software is constantly and consistently being monitored. I can do my work while it does it’s in the back ground.
Cons: Sometimes they are overly cautious or overly sensitive. But I suppose they know more of what’s out there in the cyber world.
Camie K. · Accounts payable and receivable · Retail · August 17, 2025
At my company, it is used on very sensitive systems which have zero tolerance for any infection.
Pros: It is very thorough at scanning your environment, identifying and removing any threats. It has excellent customer support, you never have to wait long for a response.
Cons: The interface can be extremely slow, incurring repeated timeouts. If you try to alter your setup, from the original design, you'll likely run into trouble.
Wes P. · Principal Software Engineer · Computer Software · April 28, 2025
$93
Pros: The Vendor Support has been Fantastic! Their Application Control and Elevation Control has been a great addition to DiD Security Stack! The ability to overwrite Microsoft Windows default UAC with ThreatLocker and give end users more control over apps that are approved to run is a huge help for those tools that require Admin writes just to function.
Cons: The ability to control the Tray settings and the ability to add customer popups to the Request Access popup is my least favorite part of the tool. It's pretty limited and doesn't allow much ability to customization options.
Matthew C. · Lead Security Analyst · Information Technology and Services · February 11, 2025
$94
Pros: Overall it has been a fantastic experience the software and solution is solid and the support and team have been invaluable getting this implemented across our customer base. Once properly implemented (which does take time and effort) it provides a controlled, safe environment and sets secure boundaries for our clients systems without the large performance overheads that so many other applications impose. The cost of Threatlocker and the time you need to provide to getting it set-up is absolutely worth it. Not only does the application deliver peace of mind to the customer environments we have deployed it to, it also gives us confidence knowing they are safe and secure. It ticks all the boxes for one of the biggest challenges out there and that's securing customers and meeting Cyber Security requirements.
Cons: I don't quite see this as a con personally but prospective customers need to be aware that this is a complex security tool which requires a large commitment of time and effort to get configured. It's not by any stretch of the imagination and tool that you just install and forget.
Paul W. · Director · Information Technology and Services · February 6, 2025
It gives zero trust security to machines , very scalable to block the unwanted things. Difficult to make changes in production environment along with multiple access issues faced.
Pros: 1. Easily capture the vulnerable applications and blocked those. 2. Very easy deployment of this security software. 3. It provides a mobile application as well which is very convinient to give responses on alerts.
Cons: 1. To make changes in the already running environment , it is quite difficult. 2. Very slow performance of this product observed.
Surbhi C. · Threat Researcher · Information Technology and Services · January 20, 2025
Overall, this is a great and trusted first line of defense.
Pros: As a large corporation, it is imperative to have cybersecurity to keep us safe from cyber threats. ThreatLocker provides us safety as a first line of defense against ransomware and vulnerability attacks. The feature I like most about ThreatLocker is the allowlisting feature. If it is not on the "allow" list, it will block it.
Cons: It is not a complete threat detection software as it does not include E-mails or webcam threat detection
Tammy W. · ITFM Analyst · Oil & Energy · December 23, 2024
Pros: I love the zero trust model that they use, as well as the ease of deployment and deployment management. The storage management is also fairly robust.
Cons: There is an extremely steep learning curve for policy management, which maybe tricky for non savvy users. This can also introduce policy errors as a result of improper use.
Aiden A. · Fullstack Engineer · Computer Software · December 23, 2024
Threatlocker has been a fantastic addition to our defense-in-depth strategy for our clients and we are very happy with the tool. The onboarding process painless with the help of the Threatlocker's learning mode and the Threatlocker team, you'll have a pretty solid baseline application whitelist within a couple weeks. The onboarding/success team are very thorough and attentive, and they meet with you as often as you need them to, and they continue meeting with you regularly to make sure everything is going well. They truly care about your use of their tool and they want to make sure you're using it in the most secure way. Their on-demand support is top notch as well with quick response to live chat and their willingness to hop on video call to assist with whatever is needed. I would recommend Threatlocker to anyone who cares about security of their organization.
Pros: The onboarding process is painless, with the help of learning mode and the Threatlocker team.
Cons: Honestly- nothing comes to mind The team at Threatlocker are so willing to teach you and guide you through the process that it made this software a nobrainer.
Stephenie G. · Sales and Marketing Manager · Management Consulting · November 11, 2024
Threatlocker has been a great addition to our security stack, and we recommend it to anyone reading this review. Rarely do we find a vendor who works with us to get the best out of their product more than Threatlocker. We are huge fans.
Pros: ThreatLocker's default-deny approach effectively locks down our environment by proactively protecting our endpoints. Every two weeks, our reps meet with us, offering insights and assistance that make them feel like an extension of our team. Due to ThreatLocker's protection, we don't require additional MDR or XDR solutions, making it an efficient and effective way to keep our organization secure.
Cons: It's true that ThreatLocker requires a bit of a learning curve to become proficient with it, however, it's certainly not an insurmountable hurdle and it's definitely worth taking the time to become familiar with the platform. Our TL reps are always available for any questions or assistance we need, and they always go the extra mile to ensure we understand the platform.
Michael A. · VP of Cloud Compliance and Client Success · Government Administration · November 6, 2024
Overall ThreatLocker has been a fantastic addition to our stack. Several MSPs warned me about the complexity of implementing TL properly, they were wrong. With the help of the Cyber Heros teams we've deployed it to over 2000 endpoints without any significant issues.
Pros: The depth of features, especially the elevation and storage control, and the rapid and detailed response from the SOC team.
Cons: I wish I could purchase it via Pax8 to help with license reconciliation
Ian G. · Managing Director · Information Technology and Services · October 29, 2024
Our overall experience has been excellent. We use ThreatLocker on all of our servers and as many user endpoints as we can. It stops users in their tracks from installing random software or extensions that we do not approve of in our organization.
Pros: [sensitive content hidden] on of the solutions engineers is super knowledgeable. He know his way around ThreatLocker like it was the back of his hand. I like how comprehensive it is and how much tweaking can be done for apps and other settings. ThreatLocker definitely helps me sleep better at night.
Cons: It is so comprehensive that it is a world unto itself, which means that it takes some learning to be able to make use of the tweaking.
James H. · Tech Support and Network Support · Education Management · October 14, 2024
Overall very good and does it job very reliable. No issues with installations or errors. Gets the job done and keep our company safe.
Pros: I liked it ThreatLocker provides strong security when you install applications while being easy to use. The application whitelisting feature is great because it lets our company control which programs can run on our, which helps us to reduce the risk of malware. ThreatLocker combines solid security with with a simple interface, making it a great tool for keeping our computers safe.
Cons: Sometimes program installation take multiple requests in order to install. Especially when they use Command Line or scripts (e.g. Xampp). You have to wait for approval everytime which can delay the process of using that software.
Anonymous User · IT Director · Marketing and Advertising · October 13, 2024
Fantastic, great product. Has increased our Security Posture business wide, has left me feeling so much more confident about the security of our infrastructure & endpoints.
Pros: First of all the Service provided by Threatlocker (In my case [sensitive content hidden] who is an excellent engineer - who really took the time to understand our needs and really understands the product). The implementation is always my worry with these types of tools, the implementation has been seamless due to the learning process. Combine [sensitive content hidden] on the implementation side with the Cyber Heroes quick response time this is a great end to end product.
Cons: Alerting on Threats, this is being really picky. But more specific alerting on threats with embedded information would be great.
Kieran R. · Technical Director · Information Technology and Services · October 3, 2024
Pros: $95
Cons: ThreatLocker is a robust solution. It can be very daunting to get started and comes with a time commitment to learn\configure. I could see how some companies could struggle getting through that phase, but it is worth it.
Nathan V. · Desktop Technician and IT Consultant · Information Technology and Services · October 2, 2024
Its been Great. [sensitive content hidden] our initial account manager was very patient with us as our business started up. Gave us time and continued to check in to see what we needed help with. [sensitive content hidden] is also very knowledgeable and is passionate about Threatlocker!
Pros: The people. Everyone we have interacted with, has been patient and understanding along with very knowledgeable!
Cons: Nothing as of now besides price but we understand we got a good deal for only 20 users
Xuan N. · CO FOUNDER · Information Technology and Services · September 25, 2024
We're very new with the product, but so far it has everything I look for in that it is easy to deploy and manage and having Cyber Hero there to approve application requests means our staff doesn't have to take time away from other tasks to review those.
Pros: The interface is intuitive. I like the granularity of control over what we can allow deny. Deployment is easy with our RMM. Once I got the hang of it the management of it is very straight forward. Cyber Hero support is very responsive and helpful. Onboarding with Richard Dowdy has been great. He's been patient as we learn the product and explains things very clearly.
Cons: I suppose the initial learning curve. Although, it was not a big deal as we worked through it with Richard.
Kevin D. · CTO · Information Technology and Services · September 20, 2024
There was the usual learning curve to climb at the start, but the Cyber Hero's were there for us when we needed them. The continual product/service enhancement has given us confidence that we have made the right choice for Application Control.
Pros: the "Built-in" Application definitions and Policies... and the Behind the scenes management (absorption) of the major OS (Microsoft) update releases - and the same for the major Applications (Adobe).
Cons: the setup of new Administrators has been tricky. Seems to be getting better.
David A. · Systems Engineer · Information Technology and Services · September 19, 2024
[sensitive content hidden] is extremely helpful and knowledgeable. A great asset to the company and to me. Thank you
Pros: Granular Control: I like the ability to control systems and application files.
Cons: The approval for an application in an acceptable time, which was taking care of switching to unifi.
Ritch G. · Owner · Computer & Network Security · September 16, 2024
Our team is happy to be with ThreatLocker!
Pros: ThreatLocker is a very reliable product that our company has been using for a while. It has successfully caught numerous threats and prevented us from falling victim to various cyber attacks.
Cons: ThreatLocker can be quite sensitive when downloading content from the internet, even from trusted websites. I often need to submit a ticket and wait for team approval. Sometimes it disrupts my workflow because I have to wait for an approval. However, given the statistics, the extra steps are worth it.
Ana K. · Marketing Coordinator · Information Technology and Services · August 28, 2024
ThreatLocker has restored my faith in vendors who prioritize genuine value over sales. Amidst a market where PE Firms often push vendors towards aggressive sales tactics, reducing MSPs to mere extensions of their sales force, ThreatLocker stands out. Their commitment to value shines through exceptional support—knowledgeable and responsive, often resolving issues on the initial call. They're attentive to partner input, swiftly adapting their roadmap accordingly. Moreover, they adeptly address the unique demands of SMBs, MidMarket, and Enterprises, demonstrating their versatility and dedication to all sectors.
Pros: ThreatLocker distinguishes itself from typical MSP vendors by prioritizing integrity over trends. Through my interactions with them, I've gained trust in their commitment to being a steadfast ally in our cybersecurity efforts, acting as a vigilant guard against the proverbial fox (Defender) lurking near the hen house. Their 'default deny' strategy effectively removes false positives in SOC monitoring of EDR telemetry, providing peace of mind. Embracing this stringent approach ensures a more secure and restful night.
Cons: Adopting a default deny strategy was more transformative than I anticipated. The initial workload was surprising, but the value of Cyberhero support became clear quickly. For those considering this approach, I advise setting up regular weekly meetings to ensure diligent development of your initial policies. It’s a commitment that truly pays off in securing your environment.
Brian W. · CEO · Information Technology and Services · June 29, 2024
- |
| Privileged Access Management | 1 | 25 | - |
| Cybersecurity | 2 | 5 | Shortlist |
| Managed Service Providers (MSP) | 2 | 18 | - |
| Computer Security | 2 | 19 | Shortlist |
| Network Security | 2 | 19 | - |
| Endpoint Protection | 2 | 20 | - |