Try our new research platform with insights from 80,000+ expert users

Deep Instinct Prevention Platform vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Deep Instinct Prevention Pl...
Ranking in Endpoint Protection Platform (EPP)
43rd
Average Rating
8.6
Number of Reviews
18
Ranking in other categories
Anti-Malware Tools (14th)
ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
13th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
17
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (6th)
 

Mindshare comparison

As of November 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Deep Instinct Prevention Platform is 0.7%, down from 0.8% compared to the previous year. The mindshare of ThreatLocker Protect is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Aaron Branson - PeerSpot reviewer
Jun 21, 2023
Bolsters prevention with great detection and response capabilities
Due to the nature of deep learning, it’s sometimes difficult to determine why the AI model has blocked a specific file, although this has improved over time. The downside of its intelligence and automation is we could use more logging details of what happened behind the scenes. Enhancements for multi-tenant use cases will be a plus as we scale up usage. We're able to work around it within our own multi-tenant XDR platform, but the improved delineation of parties within an instance is beneficial. Continuous improvement to the admin UI naturally will help improve the experience and allow us to work faster. Sometimes it can be chalked up to training, however, great UX makes a big difference in saving time. Wider Linux flavors coverage also would be a plus.
Roy Richardson - PeerSpot reviewer
Nov 28, 2023
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Deep Instinct's detection rate is close to 100 percent."
"The most valuable features are the static/dynamic analyses. Deep Instinct's predictive model has very high accuracy and provides threat information for unknown malware, such as malware classification, static analysis information, and sandbox information."
"It has given us a more structured approach for detecting and preventing threats. It has machine learning-based detection and prevention. Their engines, in even older versions, are able to pick these viruses and malware. They have posted a lot of use cases online for detecting different viruses and malware that have been out for many years."
"I like the dashboard. It looks very simple."
"The CPU consumption is low compared to what I have been using in my current environment, which is Sophos. The footprint is a lot smaller, about a quarter of Sophos. It is very small."
"The product offers integration capabilities and is also easy to use."
"This solution is good at catching viruses and it's very effective and lightweight, which are all things that you want in an antivirus product."
"Deep Instinct complements the solutions we already have. You don't need to rip and replace any antivirus or endpoint that you have. It's easy to use and it's easy to have it side-by-side with other solutions. That makes it really easy to have an additional level of protection, rather than to hassle with doing solution migration."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"The application whitelisting feature allows us to block and manage approved applications effectively. It ensures that no one can install an application on our systems unless it is approved by me, which is very efficient."
"ThreatLocker Protect has improved my organization greatly."
"ThreatLocker provides visibility into user activity and application usage, empowering organizations to define acceptable applications and web browsers."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
 

Cons

"The Management Console is not localized."
"The interface on the endpoint could be a little more descriptive and more valuable. It doesn't always tell you the data you need to see. Improvement there would be very helpful."
"I would like to see improvement in the user interface so that the user has more control. For example, it would be good if a user could change their grouping if they want to be part of another group. Or if I want to right-click and scan a specific file that I just imported, that would be helpful. Sometimes you just want to do an extra scan to make sure you're safe."
"If they can bring some additional, complementary solutions, like network scanning and the like, that will help. If they had some sort of a firewall which could help detect DDoS attacks and other things, it would be an improvement"
"Some features are too resource intensive."
"I think it's probably the administration, especially the administration platform, which could be improved in the solution. It's clunky and hard to navigate, especially for inexperienced technicians."
"Its support for Linux and Unix operating systems can be improved. Currently, they cover macOS and Windows, but they don't cover Linux and some of the Unix products. Pricing is also an issue. Its pricing is not as aggressive as it could be, and its price makes it difficult to sell. Customers feel that they can get an antivirus for a lower price, even though it is not a similar product. It is technically different. Their SLAs can be better. They have to give you 24/7 support, but their SLAs are not very good. They should be better documented, and the offerings should also be a little bit better. What happens is that the SLAs end up in the hands of the intermediary, seller, or the local partner of Deep Instinct in a country. The customers want very fast SLAs in a very short time, but Deep Instinct doesn't give them at the same speed. Having said that, SLAs are important when you have a lot of issues, but this product doesn't have too many issues, so it is not a big concern. However, for a customer who doesn't know the product, it could be a concern."
"Reporting on incidents needs improvement."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"Adding applications to the allowlist can sometimes feel overwhelming."
"ThreatLocker could offer more flexible training, like online or offline classes after hours. The fact that they even provide weekly training makes it seem silly to suggest, but some people can't do it during the day, so they want to train after work. They could also start a podcast about issues they see frequently and what requires attention. A podcast would be helpful to keep us all apprised about what's going on and/or offline training for those people who can't train during the week."
"There are some times when applications get submitted, the hashes don't really line up."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
"The support could be quicker."
"The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
 

Pricing and Cost Advice

"We are a nonprofit. The MSP had provides pretty decent nonprofit rates for us. This was one of the key factors that made us choose Deep Instinct over its competitors who were significantly more expensive."
"There are no additional costs on the price, and our company has a support contract, which bundles in those services anyway."
"The pricing is a little bit expensive but we are satisfied with DI's performance."
"In comparison to the other products out there, it's exceptionally competitively priced. When you consider the lower administrative overhead that it facilitates, it's an absolute value."
"If I include the false positive rate and the detection rate in the comparison, Deep Instinct is worth its price."
"One thing about their licensing program that I like is that just one covers the server as well as on the endpoint as well as mobile devices. There is no complexity in calculating how many SKUs I need for mobile, for laptop, for desktop, and for servers. It's very simple and that makes it much easier to budget."
"Its pricing is too high, but that is not because of the product. It is expensive because of the cost of the console. You need a console to control the whole thing, but the console is expensive. You have to split this cost among all possible users. Normally, to be able to make it economically attractive, you need at least 1,000 agents, PCs, or users. If you have a customer with 300 to 500 agents, PCs, or users, it becomes too pricey."
"There is a need for customers of the product to pay towards the licensing costs of the tool."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"The pricing works fine for me. It's very reasonably priced."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"ThreatLocker's pricing seems justifiable."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Financial Services Firm
12%
Manufacturing Company
6%
Healthcare Company
6%
Computer Software Company
37%
Retailer
7%
Government
6%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Deep Instinct?
The product offers integration capabilities and is also easy to use.
What is your experience regarding pricing and costs for Deep Instinct?
There is a need for customers of the product to pay towards the licensing costs of the tool.
What needs improvement with Deep Instinct?
The solution's stability is good. If the tool was able to provide fine-tuning capabilities from the product's end depending on the environment of its user, then it would be a good improvement in th...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What needs improvement with ThreatLocker Allowlisting?
I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much. I've found that if a user opens a file from another location, it might trigger an approval process. The same ...
 

Also Known As

No data available
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

Find out what your peers are saying about Deep Instinct Prevention Platform vs. ThreatLocker Protect and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.