
There are aspects of Cyber Ins that are necessary, so let’s get that out of the way.
But Ins is reactive whereas properly managed Default Deny is proactive. Decide where you want your $$ to go. Análise coletada por e hospedada no G2.com.
TL, like any good solution, needs attention and configuration. If you are serious about managing and securing your environment, it should get attention almost everyday. So if I have to pick what I dislike about TL, it would be that it IS a good solution so I need devote resources to managing it. This is not a Set and Forget tool. Análise coletada por e hospedada no G2.com.
263 de 264 Avaliações Totais para ThreatLocker
Sentimento Geral da Revisão para ThreatLocker
Entre para ver o sentimento das avaliações.

It allows me to sleep easier knowing that we have a much stronger barrier. With how good the Cyber Hero team is, it really takes away any headaches when it comes to security—they’re incredibly quick and helpful with anything I need assistance on. Knowing I have the support of their MDR team 24/7 gives us real security no matter what. Análise coletada por e hospedada no G2.com.
It takes some time to fine-tune policies, especially in the beginning, and managing approvals can be a bit of a learning curve. It’s not a “set-it-and-forget-it” tool, but once properly configured, it provides solid security without too much ongoing hassle. Análise coletada por e hospedada no G2.com.
Deny all, unless approved. Threatlocker have paid for itself a few times now. I had a user who was too, hurrying through a bunch of emails and accidentally clicked on a link. It was a malicious link and tried to execute something. The user called me and said something flashed across the screen. I checked ThreatLocker. ThreatLocker stopped the loading of a malware.
I had another incident where a purchaser was trying to order a part they found online. The purchaser kept clicking on the order button and a message kept popping up. The purchaser wasn’t reading the message. When I seen what they were doing . I asked why they didn’t read the message? I explained that the order button was trying steal the credit information. It was a banker Trojan virus. Análise coletada por e hospedada no G2.com.
Sometimes I will get a deny and I can’t figure what it is because it was created by a common Microsoft process. Análise coletada por e hospedada no G2.com.

First and foremost, the Threatlocker (TL) support team is excellent. Our experience was consistent throughout implementation and didn't drop off after we were up and running. Our use of TL is constantly changing and growing. The solutions engineers have been there too to guide us along the way.
Or organization runs at a fast and competitive rate so traditional application change requests are to slow and to cumbersome for users.
I also never expected TL to take us beyond application control, but their network control module enabled us to layer additional security on top of network segmentation. I'm addition to several other modules TL is the closest solution we have to a "single pane of glass" that simplifies management. Análise coletada por e hospedada no G2.com.
The early version of the UI was missing some elements that made certain actions cumbersome. However this was resolved in the new version that was released while we were still in the implementation phase. Análise coletada por e hospedada no G2.com.
O produto em si é excelente, mas o destaque é como a Threatlocker trabalha com você para garantir que seus ambientes estejam devidamente seguros, com revisões mensais. O suporte é de primeira qualidade também, é um verdadeiro prazer trabalhar com eles. Estamos tão satisfeitos com o produto que agora ele está incluído em nosso stack como padrão, especialmente agora que possui ainda mais recursos. A implantação é extremamente fácil, e a implementação via Intune ou seu RMM de escolha o colocará em uso em segundos. Não ficaríamos sem este produto, pois ele funciona tão bem e detecta coisas diariamente. Análise coletada por e hospedada no G2.com.
Não consigo pensar em nenhuma antipatia, já que você é ajudado tanto pela equipe, é óbvio. Análise coletada por e hospedada no G2.com.
It has brought clarity to our department giving us a deeper look into what is actually on our corporate machines. It has given us the opportunity to clean up our application database and remove those that have been deprecated or in general not needed for work in our environment. Análise coletada por e hospedada no G2.com.
We really have not had anything to complain about ThreatLocker. Any issues we have had are always taken care of very quickly. The Threatlocker and Mac crossover has been an area that we have enjoyed partnering with ThreatLocker to help grow. Análise coletada por e hospedada no G2.com.
My favorite thing about ThreatLocker is the support.Their knowledge base is filled with documentation that helps to answer most questions but whenever I need additional support there is always a quick and courteous response. Análise coletada por e hospedada no G2.com.
My least favorite thing about ThreatLocker is that it doesn’t use TLSH hashes. Whenever a developer changes something in a script, it gets blocked by ThreatLocker because the hash changed. I understand that it can be allowed via file name but that feels less secure as someone with inside knowledge can simply replace the file with their own and it would be allowed. Análise coletada por e hospedada no G2.com.

ThreatLocker tem o melhor suporte da indústria e é a única ferramenta multi-inquilino amigável para MSP que facilita o gerenciamento e a manutenção da lista de permissões adequada de software e comportamento de rede em comparação com qualquer outra que eu tenha encontrado. O deployment é muito fácil de fazer com quase qualquer ferramenta RMM ou de script. Muitas integrações disponíveis para PSAs principais. Análise coletada por e hospedada no G2.com.
Não há muito do que não gostar--há uma curva de aprendizado, mas seu SE ajudará você e fará auditorias com você pelo tempo que precisar, passo pelo menos uma hora por semana fazendo auditorias. Análise coletada por e hospedada no G2.com.
ThreatLocker permite que nossa pequena equipe de TI/Segurança monitore e controle aplicativos e ameaças que nossos usuários finais tentam introduzir em nosso ambiente. A capacidade de examinar novos aplicativos em um VDI e realizar solicitações de elevação a partir do mesmo sistema mantém a gestão no mínimo. O suporte da ThreatLocker também é um dos melhores que já vi em 30 anos de TI. Temos respostas para perguntas em minutos. Muitas vezes, obtemos respostas da ThreatLocker em menos tempo do que leva para alguns outros fornecedores atenderem uma chamada telefônica. Análise coletada por e hospedada no G2.com.
A única desvantagem do ThreatLocker é que a natureza à la carte das ofertas torna difícil entender quais produtos você está recebendo. A equipe é boa em explicar isso, mas pode ser um pouco confuso. Análise coletada por e hospedada no G2.com.
It's Deny-All posture is the best thing ThreatLocker; nothing is allowed unless whitelisted. Integration is seamless using our RMM, the backend is very usable for our support team and customer support is really on it. We use it on all servers and subscription based on end user devices. Análise coletada por e hospedada no G2.com.
End-Users sometimes have a hard time grasping the advantages of Zero Trust. Análise coletada por e hospedada no G2.com.

I use threatlocker in my current job it makes my life way more easier.
It just block all and only allow what's needed.
It's just makes work easier and wonders.
I will be definitely be back here.
Although the trip was not sponsored by threatlocker but I would recommend to everyone that wants to know more about Zero Trust architecture to visit this event.
I will be here next year as well!
Thanks Threatlocker for arranging this brilliant and wonderful event. Análise coletada por e hospedada no G2.com.
Honestly it's nothing that I can complain. Análise coletada por e hospedada no G2.com.