Deny all, unless approved. Threatlocker have paid for itself a few times now. I had a user who was too, hurrying through a bunch of emails and accidentally clicked on a link. It was a malicious link and tried to execute something. The user called me and said something flashed across the screen. I checked ThreatLocker. ThreatLocker stopped the loading of a malware.
I had another incident where a purchaser was trying to order a part they found online. The purchaser kept clicking on the order button and a message kept popping up. The purchaser wasn’t reading the message. When I seen what they were doing . I asked why they didn’t read the message? I explained that the order button was trying steal the credit information. It was a banker Trojan virus. Review collected by and hosted on G2.com.
Sometimes I will get a deny and I can’t figure what it is because it was created by a common Microsoft process. Review collected by and hosted on G2.com.
263 out of 264 Total Reviews for ThreatLocker
Overall Review Sentiment for ThreatLocker
Log in to view review sentiment.

It allows me to sleep easier knowing that we have a much stronger barrier. With how good the Cyber Hero team is, it really takes away any headaches when it comes to security—they’re incredibly quick and helpful with anything I need assistance on. Knowing I have the support of their MDR team 24/7 gives us real security no matter what. Review collected by and hosted on G2.com.
It takes some time to fine-tune policies, especially in the beginning, and managing approvals can be a bit of a learning curve. It’s not a “set-it-and-forget-it” tool, but once properly configured, it provides solid security without too much ongoing hassle. Review collected by and hosted on G2.com.

First and foremost, the Threatlocker (TL) support team is excellent. Our experience was consistent throughout implementation and didn't drop off after we were up and running. Our use of TL is constantly changing and growing. The solutions engineers have been there too to guide us along the way.
Or organization runs at a fast and competitive rate so traditional application change requests are to slow and to cumbersome for users.
I also never expected TL to take us beyond application control, but their network control module enabled us to layer additional security on top of network segmentation. I'm addition to several other modules TL is the closest solution we have to a "single pane of glass" that simplifies management. Review collected by and hosted on G2.com.
The early version of the UI was missing some elements that made certain actions cumbersome. However this was resolved in the new version that was released while we were still in the implementation phase. Review collected by and hosted on G2.com.

There are aspects of Cyber Ins that are necessary, so let’s get that out of the way.
But Ins is reactive whereas properly managed Default Deny is proactive. Decide where you want your $$ to go. Review collected by and hosted on G2.com.
TL, like any good solution, needs attention and configuration. If you are serious about managing and securing your environment, it should get attention almost everyday. So if I have to pick what I dislike about TL, it would be that it IS a good solution so I need devote resources to managing it. This is not a Set and Forget tool. Review collected by and hosted on G2.com.
The product itself is excellent, but the standout is how Threatlocker work with your to make sure your environments are secured correctly, with monthly reviews. The support is top notch too, they are a real pleasure to work with. We are so pleased with the product it is not included in our stack as standard, especially now it has even more features. Deployment is a total breeze, and implementation via intune or your RMM of choice will have it in the wild in seconds. We would not be without this product as it works so well and detecting things on a daily basis. Review collected by and hosted on G2.com.
I can't think of any dislikes, as you are helped so much via the team, it's a no brainer. Review collected by and hosted on G2.com.
It has brought clarity to our department giving us a deeper look into what is actually on our corporate machines. It has given us the opportunity to clean up our application database and remove those that have been deprecated or in general not needed for work in our environment. Review collected by and hosted on G2.com.
We really have not had anything to complain about ThreatLocker. Any issues we have had are always taken care of very quickly. The Threatlocker and Mac crossover has been an area that we have enjoyed partnering with ThreatLocker to help grow. Review collected by and hosted on G2.com.
My favorite thing about ThreatLocker is the support.Their knowledge base is filled with documentation that helps to answer most questions but whenever I need additional support there is always a quick and courteous response. Review collected by and hosted on G2.com.
My least favorite thing about ThreatLocker is that it doesn’t use TLSH hashes. Whenever a developer changes something in a script, it gets blocked by ThreatLocker because the hash changed. I understand that it can be allowed via file name but that feels less secure as someone with inside knowledge can simply replace the file with their own and it would be allowed. Review collected by and hosted on G2.com.

ThreatLocker has the best support in the industry, and is the only MSP friendly multi-tenant capable tool that makes it easy to manage and maintain proper allow listing of software and network behavior compared to any others I've encountered. Deployment is very easy to do with just about any RMM or scripting tool. Plenty of integrations available for major PSAs. Review collected by and hosted on G2.com.
There's not much to dislike--there is a learning curve, but your SE will help you and do audits with you for as long as you need, I spend at least an hour a week doing audits. Review collected by and hosted on G2.com.
ThreatLocker allows are small IT/Security team to monitor and control applications and threats that our end users try to introduce into our environment. The ability to screen new apps in a VDI and perform elevation requests from the same system keeps the management to a minimum.
The support from ThreatLocker is also some of the best I have ever seen in 30 years in IT. We have answers to questions in minutes. A lot of time we get answers from ThreatLocker in less time that it takes for some of other vendors to answer a phone call. Review collected by and hosted on G2.com.
The only downside to ThreatLocker is that the ala cart nature of the offerings makes it a hard to understand what products you are getting. The staff is good about explaining this but it can be a little unclear. Review collected by and hosted on G2.com.
It's Deny-All posture is the best thing ThreatLocker; nothing is allowed unless whitelisted. Integration is seamless using our RMM, the backend is very usable for our support team and customer support is really on it. We use it on all servers and subscription based on end user devices. Review collected by and hosted on G2.com.
End-Users sometimes have a hard time grasping the advantages of Zero Trust. Review collected by and hosted on G2.com.

I use threatlocker in my current job it makes my life way more easier.
It just block all and only allow what's needed.
It's just makes work easier and wonders.
I will be definitely be back here.
Although the trip was not sponsored by threatlocker but I would recommend to everyone that wants to know more about Zero Trust architecture to visit this event.
I will be here next year as well!
Thanks Threatlocker for arranging this brilliant and wonderful event. Review collected by and hosted on G2.com.
Honestly it's nothing that I can complain. Review collected by and hosted on G2.com.