Try our new research platform with insights from 80,000+ expert users

CrowdStrike Falcon vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Customer Service

Sentiment score
7.5
CrowdStrike Falcon's customer service is praised for prompt support but needs improvement in personalized attention and communication depth.
Sentiment score
8.8
ThreatLocker Protect's customer support is fast, efficient, highly rated, but occasionally offers hasty responses needing further clarification.
It could be better, especially with response times.
 

Room For Improvement

Sentiment score
4.9
Users highlight needs for better dashboard, integration, performance, reporting, threat detection, pricing, and support in CrowdStrike Falcon.
Sentiment score
5.8
ThreatLocker Protect needs improved training, support, integration, customization, and flexibility to enhance user experience and network efficiency.
This is problematic when immediate attention is needed.
 

Scalability Issues

Sentiment score
8.2
CrowdStrike Falcon is cloud-based, highly scalable, supports numerous endpoints, and easily adapts to businesses, ensuring extensive protection scalability.
Sentiment score
8.3
ThreatLocker Protect excels in scalability, adapting to various business sizes and efficiently managing numerous endpoints with reliable performance.
It is scalable to an extent, depending on where it is used.
 

Setup Cost

Sentiment score
7.0
Enterprise buyers find CrowdStrike Falcon's robust security services offer great value despite slightly higher pricing compared to some alternatives.
Sentiment score
5.3
ThreatLocker Protect is cost-effective, appreciated for value and transparency, with flexible tiered pricing and some negotiation inconsistencies.
The pricing is reasonable and normal.
 

Stability Issues

Sentiment score
8.2
CrowdStrike Falcon is stable and reliable, effectively managing endpoints with minimal issues, though minor update bugs may occur.
Sentiment score
6.8
ThreatLocker Protect is stable with rare, quickly resolved issues, and appreciated for minimizing downtime and enhancing stability.
Stability can be improved as there are times it goes down or requires management to adjust policies.
 

Valuable Features

Sentiment score
8.1
CrowdStrike Falcon offers comprehensive endpoint protection with real-time threat intelligence, minimal impact, AI-driven detection, and 24/7 monitoring.
Sentiment score
8.6
ThreatLocker Protect offers effortless access and management with strong security features, training, and support to meet cybersecurity standards.
 

Categories and Ranking

CrowdStrike Falcon
Ranking in Endpoint Protection Platform (EPP)
3rd
Ranking in Ransomware Protection
1st
Average Rating
8.6
Reviews Sentiment
7.6
Number of Reviews
122
Ranking in other categories
Identity Management (IM) (5th), Threat Intelligence Platforms (2nd), Endpoint Detection and Response (EDR) (1st), Active Directory Management (2nd), Extended Detection and Response (XDR) (1st), Attack Surface Management (ASM) (1st), Identity Threat Detection and Response (ITDR) (3rd), AI-Powered Cybersecurity Platforms (2nd)
ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
13th
Ranking in Ransomware Protection
6th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
17
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th)
 

Mindshare comparison

As of November 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of CrowdStrike Falcon is 10.8%, up from 9.1% compared to the previous year. The mindshare of ThreatLocker Protect is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Chintan-Vyas - PeerSpot reviewer
Easy to set up with good behavior-based analysis but needs a single-click recovery option
Most organizations are currently looking for a scheduled scan to meet their compliance needs. Other players like Symantec and Trend Micro, FireEye, et cetera, are still providing the signature-based regular scheduled scans also, which is not available in CrowdStrike. That is one parameter that we feel should be there in CrowdStrike. CrowdStrike is only working on the dynamic or the files under execution. CrowdStrike is not scanning the static files. The product could be more accurate in terms of performance. We'd like to have a single-click recovery option. With some machines getting corrupted by malware, we need an easy way to start with a blank slate if things happen. That one feature should be there in the EDR.
Roy Richardson - PeerSpot reviewer
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
11%
Manufacturing Company
9%
Government
7%
Computer Software Company
37%
Retailer
7%
Government
6%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions that are very scalable, secure, and user-friendly. Cortex XDR by Palo Alto offers ...
How does Crowdstrike Falcon compare with Darktrace?
Both of these products perform similarly and have many outstanding attributes. CrowdStrike Falcon offers an amazing user interface that makes setup easy and seamless. CrowdStrike Falcon offers a cl...
How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
The CrowdStrike solution delivers a lot of information about incidents. It has a very light sensor that will never push your machine hardware to "test", you don't have the usual "scan now" feature ...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
A valuable addition to ThreatLocker would be a column in the audit page displaying a VirusTotal score for each file. This would allow for quick identification of potentially malicious files during ...
 

Also Known As

CrowdStrike Falcon, CrowdStrike Falcon XDR, CrowdStrike Falcon Threat Intelligence, CrowdStrike Identity Protection, CrowdStrike Falcon Surface
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

Find out what your peers are saying about CrowdStrike Falcon vs. ThreatLocker Protect and other solutions. Updated: October 2024.
816,406 professionals have used our research since 2012.