Try our new research platform with insights from 80,000+ expert users

Deep Instinct Prevention Platform vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Deep Instinct Prevention Pl...
Ranking in Endpoint Protection Platform (EPP)
40th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
18
Ranking in other categories
Anti-Malware Tools (15th)
ThreatLocker Zero Trust End...
Ranking in Endpoint Protection Platform (EPP)
11th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (5th)
 

Mindshare comparison

As of February 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Deep Instinct Prevention Platform is 0.7%, down from 0.8% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Elena Yau - PeerSpot reviewer
Prevention, in advance, saves us remediation time
We have a PHI (protected health information) committee, and some of the things that we review on a weekly basis are incidents. For example, if there was malware or adware or some kind of phishing attempt, or even ransomware, we would have to investigate and see if there was any PHI impact. We've seen small things because some kind of adware made its way through the browser from some malicious link, and it's really hard to prevent those. We're putting more levels of filtering around that. There are some product development ideas that we have been working on alongside the DI team, and they've been super helpful. There are definitely a lot more little areas of improvement for the interface. Also, we have talked with the DI team about adding the forensic piece, which is what we do a lot. That would be added value and they've just recently provided more individuals to think about the roadmap. That's part of their strategy and one of the good features that they want to bring on. Hopefully, they can bring that to fruition and that will ease our workflow a little bit more. The additional predictive and prevention capabilities in the 3.0 version, that don't require special rules and configuration, help our organization. The only caveat is that when things get done automatically, I would appreciate more logging of what's happening in the background, if it is doing some kind of intervention. If we need to do some forensics, we should be able to backtrack from the log that gets uploaded to our cloud instance and see, forensically, what the root cause was. We should be able to see what instigated that trigger by DI and what exactly was done. That's a missing piece. It does a good job of preventing, but then we don't know what were the symptoms of the prevention. Let's say that there was like a PowerShell block. We'll see an indicator on the dashboard and we'll look at the logs and investigate. Sometimes we find that the logs that are captured locally on the endpoint itself are not very thorough. We were coached through our training with DI that, when troubleshooting, the DI team would always ask for the logs from the endpoint. We know what we need to do to look at something. But the logging for DI doesn't capture everything. There are some things that are missing. When it comes to root-cause analysis, or kill-chain analysis, and figuring out exactly what happened, it's very hard to do that right now on the product. I have used Carbon Black before and they're pretty good with the forensic analysis. That does save some efforts of my one engineer and myself when we have to go through the PHI committee. Right now, with Di, that feels like a blind spot. Another area for development is making the license clean-up a little bit easier. We always have to manually uninstall agents. If there were some way to remove the licensing and do better license management on the platform, that would help my team as well.
Musah Ibrahim - PeerSpot reviewer
Highly effective at controlling applications and securing our systems
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it. Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure. ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth. We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware. ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations. ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most important thing is that it is for prevention. It prevents attacks of any type of malware. Normally, what we've seen in other products is that they are not for prevention. They isolate a possible threat that they don't understand or know about, and then they check it with our database to see if it needs any correction or elimination. This means that the threat is already inside a customer's base, whereas Deep Instinct prevents a threat from getting in. Prevention is basically done by an agent in each installation, PCU, or product. An agent has its own intelligence to be able to detect if it should stop a threat or not. It has been taught. It is like a brain that has been taught to react according to any possible threat. Deep Instinct is very light. It doesn't take too much CPU attention or memory. It doesn't slow down the performance. You don't really realize any change in the performance, which makes it very different from other solutions. They are usually heavy for the users."
"It has the lowest false-positive ratio that I have come across. I have only had one which was a legitimate file that I had to whitelist. It was for one of the applications I was trying to install and integrate. But the false positive ratio is very low."
"The most valuable features are the static/dynamic analyses. Deep Instinct's predictive model has very high accuracy and provides threat information for unknown malware, such as malware classification, static analysis information, and sandbox information."
"It has a very low false-positive ratio. That is important because it means we're not wasting time... We're able to run that entire 20,000-endpoint base with just a handful of engineers."
"The support is very good. They reply and respond very quickly."
"It has given us a more structured approach for detecting and preventing threats. It has machine learning-based detection and prevention. Their engines, in even older versions, are able to pick these viruses and malware. They have posted a lot of use cases online for detecting different viruses and malware that have been out for many years."
"This solution is good at catching viruses and it's very effective and lightweight, which are all things that you want in an antivirus product."
"It's just a single agent that has everything in it... With the EDR solutions, you have to install it, then you have another service history installed, and you have behavioral analytics, etc. With this, everything is in a single small "box," a small agent that has pretty much got everything."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc."
"ThreatLocker Protect has improved my organization greatly."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"ThreatLocker provides visibility into user activity and application usage, empowering organizations to define acceptable applications and web browsers."
"ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files."
 

Cons

"I would like to see improvement in the user interface so that the user has more control. For example, it would be good if a user could change their grouping if they want to be part of another group. Or if I want to right-click and scan a specific file that I just imported, that would be helpful. Sometimes you just want to do an extra scan to make sure you're safe."
"If the client is working remotely and doesn't have a VPN then the deployment is difficult to do."
"The interface on the endpoint could be a little more descriptive and more valuable. It doesn't always tell you the data you need to see. Improvement there would be very helpful."
"If they can bring some additional, complementary solutions, like network scanning and the like, that will help. If they had some sort of a firewall which could help detect DDoS attacks and other things, it would be an improvement"
"I would like a little more training for the admins."
"If the tool was able to provide fine-tuning capabilities from the product's end depending on the environment of its user, then it would be a good improvement in the solution."
"I would love to see a really exceptional, outstanding level of reporting. I know that's like asking for a unicorn to leap out of the sky with any of these products... When everything works, clients began to wonder: "Everything's fine. Why do we need you?" That's where the reporting capabilities would allow us to really demonstrate: "Hey, here's what's actually going on, Mr. Customer.""
"Some features are too resource intensive."
"I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much."
"It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
"There are some times when applications get submitted, the hashes don't really line up."
"ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"The reporting could be improved."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
 

Pricing and Cost Advice

"In comparison to the other products out there, it's exceptionally competitively priced. When you consider the lower administrative overhead that it facilitates, it's an absolute value."
"One thing about their licensing program that I like is that just one covers the server as well as on the endpoint as well as mobile devices. There is no complexity in calculating how many SKUs I need for mobile, for laptop, for desktop, and for servers. It's very simple and that makes it much easier to budget."
"Its pricing is too high, but that is not because of the product. It is expensive because of the cost of the console. You need a console to control the whole thing, but the console is expensive. You have to split this cost among all possible users. Normally, to be able to make it economically attractive, you need at least 1,000 agents, PCs, or users. If you have a customer with 300 to 500 agents, PCs, or users, it becomes too pricey."
"If I include the false positive rate and the detection rate in the comparison, Deep Instinct is worth its price."
"Pricing and licensing are very straightforward. It's two SKUs, one is for the console and the other is for the client."
"Their pricing is very competitive. It is good, fair, and a lot cheaper than what we were doing with Cylance."
"There is a need for customers of the product to pay towards the licensing costs of the tool."
"We are a nonprofit. The MSP had provides pretty decent nonprofit rates for us. This was one of the key factors that made us choose Deep Instinct over its competitors who were significantly more expensive."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
"The pricing is fair and there is no hard sell."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
22%
Financial Services Firm
11%
Healthcare Company
7%
Manufacturing Company
5%
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Deep Instinct?
The product offers integration capabilities and is also easy to use.
What is your experience regarding pricing and costs for Deep Instinct?
There is a need for customers of the product to pay towards the licensing costs of the tool.
What needs improvement with Deep Instinct?
The solution's stability is good. If the tool was able to provide fine-tuning capabilities from the product's end depending on the environment of its user, then it would be a good improvement in th...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
 

Also Known As

No data available
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

Find out what your peers are saying about Deep Instinct Prevention Platform vs. ThreatLocker Zero Trust Endpoint Protection Platform and other solutions. Updated: January 2025.
838,713 professionals have used our research since 2012.