Try our new research platform with insights from 80,000+ expert users

Cynet vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.4
Cynet effectively protects sensitive information and counters cyberattacks quickly, though exact ROI data is unspecified yet users report value.
Sentiment score
8.2
ThreatLocker enhances security and productivity with real-time protection, leading to revenue growth and improved efficiency in one year.
The measurable benefits of using ThreatLocker include ensuring real-time protection of organizational resources and maintaining user authentication and protection levels to reduce risks.
 

Customer Service

Sentiment score
7.6
Cynet provides responsive 24/7 support, praised for SOC assistance but needs improvement in non-technical inquiries and local presence.
Sentiment score
8.4
ThreatLocker Zero Trust Endpoint Protection offers highly-rated, efficient customer service, with rapid response times and knowledgeable support, achieving user satisfaction.
Their SOC side support, when a threat is detected, is excellent.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
 

Scalability Issues

Sentiment score
7.8
Cynet provides seamless scalability and compatibility for varied company sizes, ensuring efficient performance across diverse operating systems and environments.
Sentiment score
8.3
ThreatLocker efficiently scales for all business sizes, seamlessly managing thousands of endpoints without issues, supporting diverse infrastructures.
Cynet is very scalable.
It is scalable to an extent, depending on where it is used.
 

Stability Issues

Sentiment score
8.4
Cynet is praised for its stability, reliability, and minimal issues, achieving high user ratings despite minor initial false positives.
Sentiment score
6.8
ThreatLocker offers stable endpoint protection, with minimal issues that are quickly resolved, enhancing reliability and performance for users.
Stability can be improved as there are times it goes down or requires management to adjust policies.
 

Room For Improvement

Improvements needed in mobile support, technical response, customization, reporting, usability, integrations, and feature enhancements like AI detection.
ThreatLocker could enhance its platform with flexible training, user interface improvements, better integrations, and more comprehensive support.
There should be more options than deploying solely through group policy, as the assumption that GPO is working isn’t always the case.
Having a DLP feature would also add value.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
 

Setup Cost

Cynet offers competitive pricing with flexible subscription options, integrating multiple features in one solution, including optional support costs.
Enterprise users value ThreatLocker's cost-effective Zero Trust Platform for its comprehensive features, excellent support, and customizable tiered pricing.
I think the pricing of Cynet is fair and one of the better options in the market.
The pricing is reasonable and normal.
 

Valuable Features

Cynet excels with user-friendly interface, strong threat detection, seamless integration, and comprehensive features for security and scalability.
ThreatLocker offers mobile access, zero trust protection, granular control, and support, enhancing security and reducing management costs.
The most effective features of Cynet are its ransomware protection and lateral movement deception.
The valuable aspects of Cynet are its EDR and XDR components, which are available at a reasonable price point.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
 

Categories and Ranking

Cynet
Ranking in Endpoint Protection Platform (EPP)
17th
Ranking in Ransomware Protection
6th
Average Rating
8.8
Reviews Sentiment
7.5
Number of Reviews
38
Ranking in other categories
Security Information and Event Management (SIEM) (11th), User Entity Behavior Analytics (UEBA) (5th), Endpoint Detection and Response (EDR) (14th), Threat Deception Platforms (4th), Network Detection and Response (NDR) (5th), Extended Detection and Response (XDR) (10th)
ThreatLocker Zero Trust End...
Ranking in Endpoint Protection Platform (EPP)
11th
Ranking in Ransomware Protection
5th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th)
 

Mindshare comparison

As of January 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Cynet is 1.1%, down from 1.2% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Ch342 - PeerSpot reviewer
Continuously improving and comes with automated response and SIEM/SOC
This is the third company I've worked with, and I've brought them in as a provider. For me, it's as good as it gets. Nobody likes to talk about tens, but they have a better record of detection than CrowdStrike, and they didn't shut down the world like CrowdStrike. If you really dig down into it, who are the founders of the companies? On the one hand, you have a guy who used to be a consultant, I believe, and we know they're full of it. On the other hand, you got a guy who hacked into an Israeli bank, I think, when he was about 15 years old. They eventually hired him, and now this is his third startup. So, when you look at it that way, there's no comparison.
Musah Ibrahim - PeerSpot reviewer
Highly effective at controlling applications and securing our systems
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it. Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure. ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth. We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware. ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations. ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
831,158 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Manufacturing Company
7%
Comms Service Provider
7%
Financial Services Firm
7%
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you 24x7x365? Cynet CyOps has been there for us.
What do you like most about Cynet?
In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not continued. The most valuable aspect is its integration capabilities, covering endpo...
What is your experience regarding pricing and costs for Cynet?
I think the pricing of Cynet is fair and one of the better options in the market. It's right in the middle compared to other solutions.
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
 

Also Known As

No data available
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

Meuhedet, East Boston Neighborhood Health Center
Information Not Available
Find out what your peers are saying about Cynet vs. ThreatLocker Zero Trust Endpoint Protection Platform and other solutions. Updated: January 2025.
831,158 professionals have used our research since 2012.