Try our new research platform with insights from 80,000+ expert users

Intercept X Endpoint vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Intercept X Endpoint
Ranking in Endpoint Protection Platform (EPP)
7th
Ranking in ZTNA
9th
Ranking in Ransomware Protection
3rd
Average Rating
8.4
Number of Reviews
102
Ranking in other categories
Endpoint Detection and Response (EDR) (6th), Managed Detection and Response (MDR) (8th), Extended Detection and Response (XDR) (11th)
ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
13th
Ranking in ZTNA
8th
Ranking in Ransomware Protection
6th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
17
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th)
 

Mindshare comparison

As of November 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Intercept X Endpoint is 2.3%, down from 5.9% compared to the previous year. The mindshare of ThreatLocker Protect is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Khandokar Rabbi - PeerSpot reviewer
Mar 26, 2024
Used for endpoint security, ransomware protection, virus protection, and server security
Intercept X Endpoint is deployed on the cloud in our organization. Previously, we had two ransomware attacks when we were using Kaspersky as an endpoint security. We didn't face any ransomware attacks after using Intercept X Endpoint for endpoint security. Intercept X Endpoint has simplified our malware detection. Since we have already implemented the policies in the cloud, all the malware is automatically detected. The solution also detects and removes new malware that can also come from the cloud AI engine. Integrating Intercept X Endpoint with our current security infrastructure was very easy. In my opinion, Sophos is a better solution because we are using Sophos endpoint security and network security. These two things sync with each other and monitor the packets and network traffic. No other vendor has simultaneous devices to check everything. I would recommend the solution to other users. Overall, I rate the solution an eight out of ten.
Roy Richardson - PeerSpot reviewer
Nov 28, 2023
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This solution can be used with any device, mobiles, desktops, or any appliances."
"The solution has very good usability."
"It is a practically maintenance free intelligent system that independently protects environments from malicious attacks."
"The initial setup is simple."
"One of the best use cases involves synchronized security staff, which allows us to manage both the firewall and the anti-virus features from the cloud."
"After that, the client switched to Sophos to get the protection they lacked. It either works or it doesn’t and Sophos works."
"The Managed Detection and Response service provided by Intercept X Endpoint is highly valuable. With a team of 600-700 individuals monitoring systems, they swiftly respond to attacks, either informing us to isolate or directly removing threats. This full MDR service is especially recommended for sectors like finance, where data security is critical. The deep learning technology within Intercept X Endpoint enhances our security posture by analyzing behaviors and algorithms to differentiate between legitimate users and threats, effectively preventing attacks on our network infrastructure."
"It is stable and has a good price. I find it very good."
"ThreatLocker provides visibility into user activity and application usage, empowering organizations to define acceptable applications and web browsers."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"Every single feature has been invaluable."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"The unified alerts are useful."
"The sandbox functionality is fantastic."
"Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc."
 

Cons

"The product’s DDoS and AI features must be improved."
"The customer service and support could be improved in regards to response time. It could be faster."
"From the management side, we receive detailed information. Sophos has many features, such as Threat Hunting but that comes with the XDR version of the solution. There's Sophos Intercept X and then there's Sophos Intercept X with XDR technology. We bought the XDR and then now the MTR, Managed Threat Response version available too. They have different packages for clients which gives them different options to pick from. If Sophos could combine more features into one package it would be beneficial."
"They don't have the full stack of offerings as compared to the other competitive products that we see."
"Better protection in the endpoint, server, and mobile is needed."
"Stability-wise, we had issues with some clients which had to be dealt with manually. The issue was with that installation part."
"It could be a bit easier to implement."
"This product does not handle USB drives well."
"A valuable addition to ThreatLocker would be a column in the audit page displaying a VirusTotal score for each file."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"We identified several areas that we would like to see improved."
"It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
"The reporting could be improved."
"The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
 

Pricing and Cost Advice

"While I do not have much experience dealing with the price, we have been entitled to a substantial discount on the solution in our use of it as an educational tool."
"When you start going to the EDR technologies and the MTR, it is a little bit expensive. It's a very good technology, and obviously, you're going to pay for it, but the pricing could do a little bit of work."
"The solution’s pricing is high."
"The price of this product should be reduced because it is a little high."
"The price of Sophos Intercept X is competitive."
"One can pay for the license annually, or at two and five year intervals."
"Licensing fees are paid monthly."
"I would rate the price 7 out of 10, where 1 is most expensive and 10 is cheapest. Also, a little reduction in price can be a great move for Intercept X Endpoint."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"The pricing works fine for me. It's very reasonably priced."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
20%
Manufacturing Company
6%
Government
6%
Educational Organization
6%
Computer Software Company
37%
Retailer
7%
Government
6%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Crodwstrike Falcon compare with Sophos Intercept X?
I like that Crowdstrike Falcon allows me to easily correlate data between my firewalls. Its detection and machine learning are very valuable features. Crowdstrike Falcon also successfully prevents ...
What is your experience regarding pricing and costs for Sophos Intercept X?
The pricing is a little bit higher than that of other solutions.
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What needs improvement with ThreatLocker Allowlisting?
I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much. I've found that if a user opens a file from another location, it might trigger an approval process. The same ...
 

Also Known As

Sophos Intercept X
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

 

Sample Customers

Flexible Systems
Information Not Available
Find out what your peers are saying about Intercept X Endpoint vs. ThreatLocker Protect and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.