Try our new research platform with insights from 80,000+ expert users

Fortinet FortiClient vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Fortinet FortiClient
Ranking in Endpoint Protection Platform (EPP)
17th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
91
Ranking in other categories
Endpoint Compliance (1st), Enterprise Infrastructure VPN (2nd)
ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
13th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
17
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (6th)
 

Mindshare comparison

As of November 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Fortinet FortiClient is 2.4%, down from 2.8% compared to the previous year. The mindshare of ThreatLocker Protect is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Ayman Said - PeerSpot reviewer
Oct 15, 2024
Enhance secure remote access with feature-rich VPN and content filtering
We mainly use FortiClient as a VPN client. Additionally, we use it for anti-malware, anti-spam, and as a content filter. When a user is outside the company, we can use FortiClient as a content filter to control the sites the user can access FortiClient has improved our security posture by…
Roy Richardson - PeerSpot reviewer
Nov 28, 2023
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's got a very friendly user interface."
"The product is user-friendly."
"FortiClient's most valuable features are that it's easy to install and connect and has OTP on email IDs and two-factor authentication."
"FortiClient benefits us by allowing control over internal and external users of the Fortinet network."
"Fortinet FortiClient is easy to use, and the single-access managed login is pretty good."
"It's easy to use, easy to deploy, and I have more visibility over my network that shows which users are connected to the firewalls, which users are connected to the network, and what they're accessing."
"The solution is easy to configure and manage."
"Fortinet FortiClient can be used with FortiManager to observe all actions that are happening."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"ThreatLocker Protect has improved my organization greatly."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"The unified alerts are useful."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
 

Cons

"The product's performance and pricing could be better."
"We've got one client where it was blocking the smartphones, and there's a way to set it up on Fortigate that's supposed to do that. However, it didn't work with them since they had a 2FA multi-factor."
"Technical support is awful. Their online response time is not prompt. They should not respond after four or five days. Their support guys are not competent enough. Small issues are taking time."
"I would like to see an improvement in the web filter, because I think it can be more user-friendly."
"The software inventory part is not yet up-to-date. It doesn't have a great interface, which is a disadvantage. I wish we could leverage it, but we don't use it at all because it's not that reliable."
"Fortinet FortiClient could improve the compatibility with mobile applications that are allowed and sometimes they do not respond. However, Microsoft Windows applications are very good."
"Compatibility issues between different versions."
"It takes too long to install."
"I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much."
"A valuable addition to ThreatLocker would be a column in the audit page displaying a VirusTotal score for each file."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"The reporting could be improved."
"The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
"More visibility in the built-ins would be nice."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"The support could be quicker."
 

Pricing and Cost Advice

"The licensing fee varies with what one is trying to accomplish. It can range from being free to costing several hundred thousand dollars per year."
"Generally, Fortinet is not cheap. The features that are available for free are only for FortiClient VPN clients, not other solutions. It includes web security, antivirus, and one more feature."
"I rate the product's pricing a seven out of ten."
"Pricing is an area that I would like to see improved, as it could be lower."
"The solution's scalability is inexpensive."
"FortiClient is quite reasonably priced."
"The price is okay and competitive."
"Licensing was free up to ten users and after that, it was pretty reasonable."
"ThreatLocker's pricing seems justifiable."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"The pricing works fine for me. It's very reasonably priced."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
41%
Computer Software Company
10%
Government
5%
Manufacturing Company
5%
Computer Software Company
37%
Retailer
7%
Government
6%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Fortinet FortiClient compare with Open VPN Access Server?
Fortinet FortiClient is a feature-rich solution that is easy to use and deploy without sacrificing safety and security. It has a very fast connection rate and has a built-in VPN. With this solution...
What's the difference between Fortinet's FortiEDR and FortiClient?
I suggest Fortinet’s FortiEDR over FortiClient for several reasons. For starters, FortiEDR guarantees solid protection because it continually scans servers for emerging vulnerabilities, which gives...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What needs improvement with ThreatLocker Allowlisting?
I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much. I've found that if a user opens a file from another location, it might trigger an approval process. The same ...
 

Also Known As

FortiClient
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Information Not Available
Find out what your peers are saying about Fortinet FortiClient vs. ThreatLocker Protect and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.