261 ThreatLocker Reseñas
Sentimiento General de la Reseña para ThreatLocker
Inicia sesión para ver el sentimiento de la revisión.

It allows me to sleep easier knowing that we have a much stronger barrier. With how good the Cyber Hero team is, it really takes away any headaches when it comes to security—they’re incredibly quick and helpful with anything I need assistance on. Knowing I have the support of their MDR team 24/7 gives us real security no matter what. Reseña recopilada por y alojada en G2.com.
It takes some time to fine-tune policies, especially in the beginning, and managing approvals can be a bit of a learning curve. It’s not a “set-it-and-forget-it” tool, but once properly configured, it provides solid security without too much ongoing hassle. Reseña recopilada por y alojada en G2.com.
Deny all, unless approved. Threatlocker have paid for itself a few times now. I had a user who was too, hurrying through a bunch of emails and accidentally clicked on a link. It was a malicious link and tried to execute something. The user called me and said something flashed across the screen. I checked ThreatLocker. ThreatLocker stopped the loading of a malware.
I had another incident where a purchaser was trying to order a part they found online. The purchaser kept clicking on the order button and a message kept popping up. The purchaser wasn’t reading the message. When I seen what they were doing . I asked why they didn’t read the message? I explained that the order button was trying steal the credit information. It was a banker Trojan virus. Reseña recopilada por y alojada en G2.com.
Sometimes I will get a deny and I can’t figure what it is because it was created by a common Microsoft process. Reseña recopilada por y alojada en G2.com.

First and foremost, the Threatlocker (TL) support team is excellent. Our experience was consistent throughout implementation and didn't drop off after we were up and running. Our use of TL is constantly changing and growing. The solutions engineers have been there too to guide us along the way.
Or organization runs at a fast and competitive rate so traditional application change requests are to slow and to cumbersome for users.
I also never expected TL to take us beyond application control, but their network control module enabled us to layer additional security on top of network segmentation. I'm addition to several other modules TL is the closest solution we have to a "single pane of glass" that simplifies management. Reseña recopilada por y alojada en G2.com.
The early version of the UI was missing some elements that made certain actions cumbersome. However this was resolved in the new version that was released while we were still in the implementation phase. Reseña recopilada por y alojada en G2.com.

There are aspects of Cyber Ins that are necessary, so let’s get that out of the way.
But Ins is reactive whereas properly managed Default Deny is proactive. Decide where you want your $$ to go. Reseña recopilada por y alojada en G2.com.
TL, like any good solution, needs attention and configuration. If you are serious about managing and securing your environment, it should get attention almost everyday. So if I have to pick what I dislike about TL, it would be that it IS a good solution so I need devote resources to managing it. This is not a Set and Forget tool. Reseña recopilada por y alojada en G2.com.
El producto en sí es excelente, pero lo que destaca es cómo Threatlocker trabaja contigo para asegurarse de que tus entornos estén asegurados correctamente, con revisiones mensuales. El soporte también es de primera categoría, es un verdadero placer trabajar con ellos. Estamos tan satisfechos con el producto que ahora está incluido en nuestro conjunto como estándar, especialmente ahora que tiene aún más características. El despliegue es muy sencillo, y la implementación a través de Intune o tu RMM de elección lo tendrá en funcionamiento en segundos. No estaríamos sin este producto ya que funciona tan bien y detecta cosas a diario. Reseña recopilada por y alojada en G2.com.
No puedo pensar en ningún disgusto, ya que te ayudan tanto a través del equipo, es una obviedad. Reseña recopilada por y alojada en G2.com.
It has brought clarity to our department giving us a deeper look into what is actually on our corporate machines. It has given us the opportunity to clean up our application database and remove those that have been deprecated or in general not needed for work in our environment. Reseña recopilada por y alojada en G2.com.
We really have not had anything to complain about ThreatLocker. Any issues we have had are always taken care of very quickly. The Threatlocker and Mac crossover has been an area that we have enjoyed partnering with ThreatLocker to help grow. Reseña recopilada por y alojada en G2.com.
My favorite thing about ThreatLocker is the support.Their knowledge base is filled with documentation that helps to answer most questions but whenever I need additional support there is always a quick and courteous response. Reseña recopilada por y alojada en G2.com.
My least favorite thing about ThreatLocker is that it doesn’t use TLSH hashes. Whenever a developer changes something in a script, it gets blocked by ThreatLocker because the hash changed. I understand that it can be allowed via file name but that feels less secure as someone with inside knowledge can simply replace the file with their own and it would be allowed. Reseña recopilada por y alojada en G2.com.
ThreatLocker permite a un pequeño equipo de TI/Seguridad monitorear y controlar aplicaciones y amenazas que nuestros usuarios finales intentan introducir en nuestro entorno. La capacidad de examinar nuevas aplicaciones en un VDI y realizar solicitudes de elevación desde el mismo sistema mantiene la gestión al mínimo.
El soporte de ThreatLocker es también uno de los mejores que he visto en 30 años en TI. Tenemos respuestas a preguntas en minutos. Muchas veces obtenemos respuestas de ThreatLocker en menos tiempo del que tardan algunos de otros proveedores en contestar una llamada telefónica. Reseña recopilada por y alojada en G2.com.
La única desventaja de ThreatLocker es que la naturaleza a la carta de las ofertas hace que sea difícil entender qué productos estás obteniendo. El personal es bueno explicando esto, pero puede ser un poco confuso. Reseña recopilada por y alojada en G2.com.
It's Deny-All posture is the best thing ThreatLocker; nothing is allowed unless whitelisted. Integration is seamless using our RMM, the backend is very usable for our support team and customer support is really on it. We use it on all servers and subscription based on end user devices. Reseña recopilada por y alojada en G2.com.
End-Users sometimes have a hard time grasping the advantages of Zero Trust. Reseña recopilada por y alojada en G2.com.

I use threatlocker in my current job it makes my life way more easier.
It just block all and only allow what's needed.
It's just makes work easier and wonders.
I will be definitely be back here.
Although the trip was not sponsored by threatlocker but I would recommend to everyone that wants to know more about Zero Trust architecture to visit this event.
I will be here next year as well!
Thanks Threatlocker for arranging this brilliant and wonderful event. Reseña recopilada por y alojada en G2.com.
Honestly it's nothing that I can complain. Reseña recopilada por y alojada en G2.com.