# ThreatLocker Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about ThreatLocker Software - reviews, pricing plans, popular comparisons to other Network Security products and more.

Source: https://www.capterra.com/p/195434/ThreatLocker-Control

---

# 

 ThreatLocker Software Review 2026: Features, Integrations, Pros & Cons

Last updated on February 18, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

[Description](#description)[Use cases](#use-cases)[Alternatives](#alternatives)[Features](#features)[Pricing](#pricing)[Integrations](#integrations)[Support](#support)[Reviews](#reviews)

ThreatLocker

## What is ThreatLocker?

For IT Professionals to stop ransomware, you need to do more than just look for threats. ThreatLocker® helps reduce your surface area of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, ThreatLocker® network security solutions help enhance your Zero Trust protection and block attacks that live off the land.

## What is ThreatLocker used for?

[Cybersecurity](https://www.capterra.com/cybersecurity-software/)[Managed Service Providers (MSP)](https://www.capterra.com/msp-software/)[Endpoint Protection](https://www.capterra.com/endpoint-protection-software/)

Top alternative

Featured

Overall rating

Based on 87 user reviews

Reviews sentiment

Positive

100%

Neutral

0%

Negative

0%

Starting price

$0.01

Per User, Per Month

Free trial  
available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

Do you work for ThreatLocker?[Manage this product listing](https://digitalmarkets.gartner.com/get-listed/claim-bx?url=https://www.threatlocker.com&name=ThreatLocker)

## Compare with a popular alternative

Capterra selects software alternatives based on relevant features, verified user reviews and user interactions. Placement may be influenced by client status.

### ThreatLocker

4.9 (87)

VS.

[4.1 (195)](https://www.capterra.com/p/13803/N-central/reviews/)

Starting Price

$0.01

Per User

Starting Price

$1.75

Other

Free Trial

Free Version

Pricing Options

Free Trial

Free Version

Ease Of Use

4.5 (87)

Ease Of Use

3.9 (195)

Value For Money

4.8 (78)

Value For Money

3.9 (183)

Customer Service

4.9 (83)

Customer Service

3.9 (185)

## ThreatLocker alternatives

Highest Rated

[4.7 (217)](https://www.capterra.com/p/163343/Backup-and-Recovery/reviews/)

Starting price

Contact vendor for pricing

Pricing Options

Free Trial

Free Version

User Rating

95%

of reviewers

rated it above 4 stars

[4.3 (194)](https://www.capterra.com/p/163344/N-sight/reviews/)

Starting price

$99.00

Per User, Per Month

Pricing Options

Free Trial

Free Version

User Rating

90%

of reviewers

rated it above 4 stars

[4.6 (65)](https://www.capterra.com/p/235300/SuperOpsai/#reviews)

Starting price

$79.00

Per User, Per Month

Pricing Options

Free Trial

Free Version

User Rating

95%

of reviewers

rated it above 4 stars

[4.4 (72)](https://www.capterra.com/p/212602/ManageEngine-OpManager-MSP/reviews/)

Starting price

Contact vendor for pricing

Pricing Options

Free Trial

Free Version

User Rating

96%

of reviewers

rated it above 4 stars

[View all alternatives](https://www.capterra.com/p/195434/ThreatLocker-Control/alternatives/)

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Real-Time Monitoring

4.9 (31)

80.65% of 31 reviewers that rated this feature as important or highly important

Active monitoring of systems, applications, or networks

Threat Response

4.8 (28)

96.43% of 28 reviewers that rated this feature as important or highly important

Identifying, analyzing, and mitigating security issues and taking appropriate action to protect systems and data from potential harm

Monitoring

4.9 (25)

96.00% of 25 reviewers that rated this feature as important or highly important

Observe and track the demand, usage, progress or quality of a system, product, or user

Data Security

4.7 (19)

84.21% of 19 reviewers that rated this feature as important or highly important

Protect sensitive data for digital privacy

Access Controls/Permissions

4.7 (18)

88.89% of 18 reviewers that rated this feature as important or highly important

Define levels of authorization for access to specific files or systems

Anomaly/Malware Detection

4.7 (15)

86.67% of 15 reviewers that rated this feature as important or highly important

Automatically identify and flag unusual behaviors and malicious software

ThreatLocker 51 features

Define levels of authorization for access to specific files or systems

Dashboard to view the status of ongoing processes, identify current incidents and track past activities

Track and report on everything that happens within the system or network

Track and document all activities across devices, networks, and other systems

Software program that continuously adjusts its behavior based on observed data

System alerts about the need to escalate an issue or request

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Automatically identify and flag unusual behaviors and malicious software

Application programming interface that allows for integration with other systems/databases

Identify and respond to security threats to developed applications

A record of all activities within the system, including user access, changes made, etc.

Create backups and provide methods to recover deleted/lost data

Track and analyse user behavior within a system or network

Identify component attributes like servers, hardware, software, and manage relationships across all services

Conduct tracking and assessment of application and device behavior without breaks or interruptions

Alter the layout and content of reports

Protect sensitive data for digital privacy

Maintenance and upkeep of physical and/or virtual devices

Track status, assign actions, and control access to systems for devices within the organization

Protect users working remotely and provide secure environments for personal devices to access company programs

A chronological record of actions or occurrences within a network, software, or process

Monitor and control network/web traffic based on predetermined rules, protecting against unauthorized access and threats

Compliant with HIPAA, which sets standards for sensitive patient data protection

Identify and respond to unexpected problems or failures (ie. "negative events")

Observe and track the demand, usage, progress or quality of a system, product, or user

Prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources

Install software updates and bug fixes remotely

Store, process, and transmit cardholder data in compliance with the Payment Card Industry Data Security Standard (PCI DSS)

Create new policies or alter existing policies

Create, manage, and track policies and procedures within an organization

Analyze and gain insights into data in real-time

Receive data and information in real time

Active monitoring of systems, applications, or networks

Notifications that are delivered to users as soon as an event occurs

Active reporting of data and metrics

Receive system updates as soon as any changes are made

Access work applications remotely, for when working away from the office and/or traveling

Remotely monitor and manage client networks, endpoints, systems, and devices via locally installed applications

Collection, analysis, and representation of numerical data and generation of reports to understand various patterns

View and track pertinent metrics to find patterns and gain insights from data

Notifying as a warning or reminder of a potential or imminent hazard

Plan availability and assign specific time slots for tasks and resources

At least a username and password is required to access the system

Systematic evaluation of the security of a company's overall security system and situation

Continuously scan servers on a designated network to monitor health and search for any irregularities or failures

Addition of necessary external data, applications, tools, or features

Set up connections to third-party platforms to improve business processes

Information to prevent, understand and identify cyber threats

Identifying, analyzing, and mitigating security issues and taking appropriate action to protect systems and data from potential harm

Control system access and/or deliverability for applications and email addresses

Create, design and manage workflows for repetitive tasks

Features

4.8 (87)

4.8

Based on 87 reviews

## Pricing

Value for money

4.8 (78)

Free Trial

[View pricing plan details](https://www.capterra.com/p/195434/ThreatLocker-Control/pricing/)

Basic

$0.01

Per User,

Value for money

4.8 (78)

4.8

Based on 78 reviews

## Integrations

[

Okta](https://www.capterra.com/p/119653/Okta/)[

ServiceNow](https://www.capterra.com/p/254088/ServiceNow/)[

IT Glue](https://www.capterra.com/p/170401/ITGlue/)[

ConnectWise PSA](https://www.capterra.com/p/107931/ConnectWise-Manage/)[

Splunk Enterprise](https://www.capterra.com/p/94317/Splunk/)[

Auth0](https://www.capterra.com/p/154900/Auth0/)[

Datto RMM](https://www.capterra.com/p/213158/Datto-RMM/)[

HaloPSA](https://www.capterra.com/p/20971/HaloPSA/)

## Support, customer service and training options

Customer Service

4.9 (83)

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

Customer Service

4.9 (83)

4.9

Based on 83 reviews

## User reviews

Overall rating

4.9

Based on 87 reviews

Filter by rating

5(77)

4(10)

3(0)

2(0)

1(0)

Mentioned topic

Sorted by most recent

Craig T.

Director of Marketing

Information Technology and Services

### "ThreatLocker, the dependable partner."

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

March 3, 2026

Pros

ThreatLocker is a major partner/vendor of ours, and for good reason; they are dependable and cutting-edge when it comes to their services.

Cons

Protection comes at a price, but the premium is worth the investment. They are very responsive and do regular updates.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

TK

Tatsiana K.

Manager

Computer Software

### "Get on with it already"

5.0

Overall Rating

5.0

5.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

4.0

4.0

Likelihood to Recommend

8/10

December 8, 2025

It uses AI/ML based detection to identify advanced threats, so the really bad zero-day stuff is actually being identified prior to it causing damage. Our endpoints are running with healthy malware drag and we have fewer complaints from everyone in the watercooler. It's providing us a perfectly clear view into what our devices are doing 100% of the time, which is now million times easier than was before and we can instantly act on that data after doing a search instead of waiting an hour for it all to roll in.

Pros

Honestly, CrowdStrike Falcon really does work, which is a miracle. The agent is extremely lightweight, so you don’t even realize it is there, unlike the Trellix product we used in the past, which would completely bog down our systems. Thank God. Real time detection is the big draw here, it caught a suspicious PowerShell script running on an endpoint and we were able to see the full nasty timeline in real time. You have that one lightweight agent (which is a great thing) so you do not have a bunch of disjointed pieces to deal with and the fact that it is cloud based means your responses will be that much faster.

Cons

The management dashboard is a complete disaster, it is far too complex and I truly believe that new users will think they are reading a foreign language. How often do the marketplace apps for vendor integrations go out of date at exactly the moment you need them? I wasted an entire day trying to get an integration to work for a proof of concept because the app I was using was outdated, which is infuriating.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

AU

Anonymous User

NETWORK ENGINEER

Logistics and Supply Chain

### "Total Control and Peace of Mind – My Journey with ThreatLocker!"

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

3.0

3.0

Customer Service

3.0

3.0

Likelihood to Recommend

7/10

November 12, 2025

I​‍​‌‍​‍‌ really enjoyed working with ThreatLocker. It is a very effective tool to actually implement the concept of Zero Trust security — giving you full insight and control over what is happening in your environment. Once I got past the initial learning curve, it was really obvious to me how effectively it stops unauthorized applications and possible threats from getting started. The app's allowlisting and ringfencing functionalities have been a complete turnaround in how I deal with security. I don’t have to worry about new software or ransomware coming in, as everything that is running is what I have definitely ​‍​‌‍​‍‌approved.

Pros

I​‍​‌‍​‍‌ have been using ThreatLocker for several months, and it stands out as one of the most powerful cybersecurity tools in my toolkit. Its commitment to a Zero Trust model literally blew my mind. After the installation, I was amazed by how much control I actually had over the allowed applications and scripts on our systems. The whole thing was a total overhaul of how we do endpoint protection. \* Strong Zero Trust Protection: The “deny by default” strategy implemented by ThreatLocker gives absolute control over the operations of which applications and scripts, thus the likelihood of ransomware and malware attacks is drastically reduced. \* Powerful Application Allowlisting: The allowlisting capability is highly accurate and efficient — after the completion of the setup, it acts as a security layer that permits software to run only if they are pre-approved, thus providing unbeatable endpoint security. \* Ringfencing Technology: This technology helps the separation of the different functionalities of an application so that they cannot access data or other programs unless it is necessary, thus preventing lateral attacks and data leaks. \* Comprehensive Visibility: The control panel provides an accurate and up-to-the-minute picture of what each device is doing, thus facilitating monitoring and auditing ​‍​‌‍​‍‌considerably.

Cons

I​‍​‌‍​‍‌ encountered several issues with this platform. Initial Setup Complexity: The setup was quite overwhelming when I first started using ThreatLocker. While the platform offers a lot of control and customization, it still takes a considerable amount of time to understand and properly configure the policies. Learning Curve: The product implements a Zero Trust model; hence, it requires some technical background. A new admin or a small team without a dedicated IT staff might find it difficult initially. Frequent Policy Adjustments: Initially, I had to constantly adjust the settings to allow the legitimate applications, which was somewhat inconvenient until the system got familiar with our ​‍​‌‍​‍‌environment.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

CI

Collins I.

Manager

Information Technology and Services

### "Security environment using threatLocker."

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

3.0

3.0

Likelihood to Recommend

2/10

November 10, 2025

It ensures zero-trust machine security and scales efficiently to prevent unwanted actions, though modifying the production environment is complex and prone to access challenges.

Pros

1\. Easily identify vulnerable applications and block them. 2. The deployment of this security software is very simple. 3. It also offers a mobile app, making it convenient to respond to alerts.

Cons

1\. Making changes in an existing running environment is quite challenging. 2. The product has been observed to perform very slowly.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

CK

Camie K.

Accounts payable and receivable

Retail

### "Good to be safe. "

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

5/10

August 17, 2025

I’ve had to re ask if I could open a website before because I was unaware that I had to type in a reason. So my request was just automatically denied but never was told to me it was. I waited a long time to be able to finish my work.

Pros

I like that I my computer software is constantly and consistently being monitored. I can do my work while it does it’s in the back ground.

Cons

Sometimes they are overly cautious or overly sensitive. But I suppose they know more of what’s out there in the cyber world.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

Wes P.

Principal Software Engineer

Computer Software

### "ThreatLocker, Your Zero Tolerance Solution"

4.0

Overall Rating

4.0

4.0

Ease of Use

3.0

3.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

8/10

April 28, 2025

At my company, it is used on very sensitive systems which have zero tolerance for any infection.

Pros

It is very thorough at scanning your environment, identifying and removing any threats. It has excellent customer support, you never have to wait long for a response.

Cons

The interface can be extremely slow, incurring repeated timeouts. If you try to alter your setup, from the original design, you'll likely run into trouble.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

MC

Matthew C.

Lead Security Analyst

Information Technology and Services

### "ThreatLocker a Requirement for your Security Stack!"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

February 11, 2025

I've been using ThreatLocker for about four years now within our primary security stack, and it has been rock solid. We primarily use their Application Control function, but we have also demoed their EDR solution, which is incredibly strong and significantly lighter weight than other EDRs on the market. The Application Control portion has been amazing, provided you put in the effort to tune the software for the tools you use. Their engineers are great to work with, and I haven't had a bad experience with them to date. \[sensitive content hidden\] (engineer) and \[sensitive content hidden\] (Account Rep) have been fantastic at keeping us updated on what's coming and assisting with any issues that arise. The tool is incredibly stable on our endpoints, and we've only seen minor breaks on devices with crazy high uptimes. We manage over 7,700 endpoints, all containing ThreatLocker Application Control. We couldn't recommend this tool enough if you want to keep your endpoints safe. It has single-handedly saved customers from potential compromise due to the way it allows and denies applications.

Pros

The Vendor Support has been Fantastic! Their Application Control and Elevation Control has been a great addition to DiD Security Stack! The ability to overwrite Microsoft Windows default UAC with ThreatLocker and give end users more control over apps that are approved to run is a huge help for those tools that require Admin writes just to function.

Cons

The ability to control the Tray settings and the ability to add customer popups to the Request Access popup is my least favorite part of the tool. It's pretty limited and doesn't allow much ability to customization options.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

PW

Paul W.

Director

Information Technology and Services

### "ThreatLocker is an outstanding product backed by an oustanding team"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

February 6, 2025

One of the best things about ThreatLocker is the don't just sell you the product and then leave you hanging without support or worst still charge you for the support after the initial sale like so many other companies. To be honest it was a breath of fresh air in comparison to so many other companies. They provide you with a dedicated team to ensure you get the most out of the product and that it runs optimally. We were assigned a very kind chap \[sensitive content hidden\] who deserves a huge shout out for his outstanding efforts and commitment to getting us up and running. Nothing was too much trouble he was on hand every step of the way helping us deliver ThreatLocker to all our customers but one in particular was a nightmare. Nonetheless \[sensitive content hidden\] rose to the challenge helping train, guide and often finding solutions to allowing some rather interesting applications coexist with ThreatLocker whilst securing the environment. We are still very much on a journey with \[sensitive content hidden\] and the team at ThreatLocker but the hard work is most certainly paying off and we wouldn't hesitate recommending ThreatLocker to anyone. The Cyber Hero team are available 24/7 and are always ready to help with any questions about the service or best practices and have now become an extension of our own team.

Pros

Overall it has been a fantastic experience the software and solution is solid and the support and team have been invaluable getting this implemented across our customer base. Once properly implemented (which does take time and effort) it provides a controlled, safe environment and sets secure boundaries for our clients systems without the large performance overheads that so many other applications impose. The cost of Threatlocker and the time you need to provide to getting it set-up is absolutely worth it. Not only does the application deliver peace of mind to the customer environments we have deployed it to, it also gives us confidence knowing they are safe and secure. It ticks all the boxes for one of the biggest challenges out there and that's securing customers and meeting Cyber Security requirements.

Cons

I don't quite see this as a con personally but prospective customers need to be aware that this is a complex security tool which requires a large commitment of time and effort to get configured. It's not by any stretch of the imagination and tool that you just install and forget.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

Surbhi C.

Threat Researcher

Information Technology and Services

### "Environment Security with ThreatLocker"

5.0

Overall Rating

5.0

5.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

9/10

January 20, 2025

It gives zero trust security to machines , very scalable to block the unwanted things. Difficult to make changes in production environment along with multiple access issues faced.

Pros

1\. Easily capture the vulnerable applications and blocked those. 2. Very easy deployment of this security software. 3. It provides a mobile application as well which is very convinient to give responses on alerts.

Cons

1\. To make changes in the already running environment , it is quite difficult. 2. Very slow performance of this product observed.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

TW

Tammy W.

ITFM Analyst

Oil & Energy

### "ThreatLocker is a great first line of defense"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

December 23, 2024

Overall, this is a great and trusted first line of defense.

Pros

As a large corporation, it is imperative to have cybersecurity to keep us safe from cyber threats. ThreatLocker provides us safety as a first line of defense against ransomware and vulnerability attacks. The feature I like most about ThreatLocker is the allowlisting feature. If it is not on the "allow" list, it will block it.

Cons

It is not a complete threat detection software as it does not include E-mails or webcam threat detection

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

[View all Reviews](https://www.capterra.com/p/195434/ThreatLocker-Control/reviews/)

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)