Try our new research platform with insights from 80,000+ expert users

Intercept X Endpoint vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Customer Service

Sentiment score
6.6
Intercept X Endpoint's customer service is mixed, with varied response times and challenges in Iran due to sanctions.
Sentiment score
8.8
ThreatLocker's support is praised for quick responses, knowledgeable staff, efficient issue resolution, and outstanding customer service.
Technical support from Sophos is rated as nine out of ten, which represents high quality.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
 

Room For Improvement

Sentiment score
4.5
Intercept X Endpoint needs improvements in user management, integration, support, and performance, with high cost and deployment challenges.
Sentiment score
5.7
ThreatLocker Protect needs flexible training, UI improvements, better integration, refined learning, and antivirus features for enhanced security and usability.
I would inquire why it is not sold directly to end users.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
 

Scalability Issues

Sentiment score
7.7
Intercept X Endpoint is scalable, easily expanding across various organizations, supporting both cloud and on-premise setups with minimal resources.
Sentiment score
8.3
ThreatLocker Protect efficiently scales across various organization sizes, handling thousands of endpoints with ease and adaptability.
It is scalable to an extent, depending on where it is used.
 

Setup Cost

Sentiment score
5.6
Intercept X Endpoint's pricing is mid-range, flexible, and justified by features, offering corporate rates, multi-year plans, and discounts.
Sentiment score
6.4
Enterprise buyers find ThreatLocker Protect's pricing reasonable and flexible, offering value, customization, integration, and strategic budget benefits.
The pricing of Intercept X Endpoint is a bit high.
The pricing is reasonable and normal.
 

Stability Issues

Sentiment score
8.0
Intercept X Endpoint is highly stable, reliable, minimally glitchy, seamlessly integrates, receiving generally high satisfaction ratings.
Sentiment score
6.8
ThreatLocker Protect is stable, with minor issues resolved quickly, ensuring high uptime similar to Microsoft's standards.
Stability can be improved as there are times it goes down or requires management to adjust policies.
 

Valuable Features

Sentiment score
8.1
Intercept X Endpoint excels in machine learning, ransomware protection, ease of use, and offers robust threat detection.
Sentiment score
8.5
ThreatLocker Protect ensures efficient mobile access and security with application control, zero-trust, and comprehensive user activity visibility.
Intercept X Endpoint has been stable, and I appreciate the centralized management and the reporting feature.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
 

Categories and Ranking

Intercept X Endpoint
Ranking in Endpoint Protection Platform (EPP)
7th
Ranking in ZTNA
9th
Ranking in Ransomware Protection
3rd
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
103
Ranking in other categories
Endpoint Detection and Response (EDR) (6th), Managed Detection and Response (MDR) (8th), Extended Detection and Response (XDR) (11th)
ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
12th
Ranking in ZTNA
8th
Ranking in Ransomware Protection
6th
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th)
 

Mindshare comparison

As of December 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Intercept X Endpoint is 2.2%, down from 5.8% compared to the previous year. The mindshare of ThreatLocker Protect is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Khandokar Rabbi - PeerSpot reviewer
Used for endpoint security, ransomware protection, virus protection, and server security
Intercept X Endpoint is deployed on the cloud in our organization. Previously, we had two ransomware attacks when we were using Kaspersky as an endpoint security. We didn't face any ransomware attacks after using Intercept X Endpoint for endpoint security. Intercept X Endpoint has simplified our malware detection. Since we have already implemented the policies in the cloud, all the malware is automatically detected. The solution also detects and removes new malware that can also come from the cloud AI engine. Integrating Intercept X Endpoint with our current security infrastructure was very easy. In my opinion, Sophos is a better solution because we are using Sophos endpoint security and network security. These two things sync with each other and monitor the packets and network traffic. No other vendor has simultaneous devices to check everything. I would recommend the solution to other users. Overall, I rate the solution an eight out of ten.
Roy Richardson - PeerSpot reviewer
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
823,795 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
20%
Manufacturing Company
6%
Government
6%
Financial Services Firm
6%
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Crodwstrike Falcon compare with Sophos Intercept X?
I like that Crowdstrike Falcon allows me to easily correlate data between my firewalls. Its detection and machine learning are very valuable features. Crowdstrike Falcon also successfully prevents ...
What is your experience regarding pricing and costs for Sophos Intercept X?
The pricing is a little bit higher than that of other solutions.
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
 

Also Known As

Sophos Intercept X
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

 

Sample Customers

Flexible Systems
Information Not Available
Find out what your peers are saying about Intercept X Endpoint vs. ThreatLocker Protect and other solutions. Updated: December 2024.
823,795 professionals have used our research since 2012.