Try our new research platform with insights from 80,000+ expert users

Cynet vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Cynet
Ranking in Endpoint Protection Platform (EPP)
16th
Ranking in Ransomware Protection
5th
Average Rating
8.8
Reviews Sentiment
7.7
Number of Reviews
37
Ranking in other categories
Security Information and Event Management (SIEM) (10th), User Entity Behavior Analytics (UEBA) (4th), Endpoint Detection and Response (EDR) (14th), Threat Deception Platforms (3rd), Network Detection and Response (NDR) (4th), Extended Detection and Response (XDR) (10th)
ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
13th
Ranking in Ransomware Protection
6th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
17
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th)
 

Mindshare comparison

As of November 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Cynet is 1.1%, up from 1.1% compared to the previous year. The mindshare of ThreatLocker Protect is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Ch342 - PeerSpot reviewer
Aug 2, 2024
Continuously improving and comes with automated response and SIEM/SOC
This is the third company I've worked with, and I've brought them in as a provider. For me, it's as good as it gets. Nobody likes to talk about tens, but they have a better record of detection than CrowdStrike, and they didn't shut down the world like CrowdStrike. If you really dig down into it, who are the founders of the companies? On the one hand, you have a guy who used to be a consultant, I believe, and we know they're full of it. On the other hand, you got a guy who hacked into an Israeli bank, I think, when he was about 15 years old. They eventually hired him, and now this is his third startup. So, when you look at it that way, there's no comparison.
Roy Richardson - PeerSpot reviewer
Nov 28, 2023
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like that you can implement it in the managed service portfolio."
"The interface is exceptionally clear and easy to understand."
"The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued."
"Cynet is light and transparent when downloaded. The product's data aggregation is also valuable since you can see everything you need on a page."
"The most valuable aspect of this solution is that it is a complete solution, which makes cyber security very free and almost perfect. There is no such thing as perfect cyber security, but as far as it can go, sign it comes close to being perfect and holistic. Cynet is always comprehensive from the perspective of functionality, as well as from the standpoint that it encompasses not only technology but also processes and people. The triad of people, processes, and technology is crucial and should always be in place. To my knowledge, no other product or platform combines all three components into one, but Cynet does."
"It can be deployed in autonomous mode, and then it automatically blocks malware threats."
"This solution requires less management and is very easy to use."
"The initial setup is very fast and very easy."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc."
"ThreatLocker provides visibility into user activity and application usage, empowering organizations to define acceptable applications and web browsers."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
 

Cons

"Management of the console could be simplified and made more user-friendly because right now it's not very easy to use."
"I would like to see more emphasis on building the data lake and storing all endpoint data in the enterprise data lake so that data mining can be performed"
"One thing to note is that I highly recommend adding a deep learning-based prevention environment as an additional layer to Cynet. However, I always advise my customers to start with Cynet or XDR, for example, and then focus on the people, technology, and processes involved. This is the best approach to ensure that you are not breached with ransomware. While Cynet can prevent most attacks, there have been cases where ransomware has been quicker than Cynet's detection capabilities. In these situations, an additional tool is necessary to ensure complete protection, and that is what I sell as well."
"Increased application for SOAR abilities across interconnected devices would be a welcome improvement."
"I suppose everybody's working on AI these days. So, I would like to see more about AI-based threats."
"The command line interface could be improved."
"Its dashboard is not so good. On the dashboard, they don't show the count for client endpoints, which is a failure of this product. This count should be shown on the dashboard. I have 1,000 clients, but I can't see it anywhere on the dashboard."
"There are some shortcomings in Cynet's integration capabilities that need improvement."
"It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"The reporting could be improved."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"A valuable addition to ThreatLocker would be a column in the audit page displaying a VirusTotal score for each file."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"We identified several areas that we would like to see improved."
 

Pricing and Cost Advice

"Pricing wise, Cynet seems to be very competitive. The cost is probably lower than that offered by many of its competitors for all the functions and features it offers."
"Cynet is cheap."
"We purchase the product’s yearly license."
"it's not cheap, but I would rate it a three out of ten. If one is cheap and ten is expensive."
"Our billing is on a quarterly basis, but they have monthly or annual billing availability."
"The price should not be less than $100 which is quite reasonable for this solution because you are getting multiple components."
"It gives you a high level of protection at a very good price."
"Cynet is very affordable."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"The pricing is fair and there is no hard sell."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Financial Services Firm
7%
Manufacturing Company
7%
Comms Service Provider
7%
Computer Software Company
37%
Retailer
7%
Government
6%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you 24x7x365? Cynet CyOps has been there for us.
What do you like most about Cynet?
In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not continued. The most valuable aspect is its integration capabilities, covering endpo...
What is your experience regarding pricing and costs for Cynet?
I don't have specific information about integration capabilities or licensing costs.
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What needs improvement with ThreatLocker Allowlisting?
I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much. I've found that if a user opens a file from another location, it might trigger an approval process. The same ...
 

Also Known As

No data available
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

 

Sample Customers

Meuhedet, East Boston Neighborhood Health Center
Information Not Available
Find out what your peers are saying about Cynet vs. ThreatLocker Protect and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.