Try our new research platform with insights from 80,000+ expert users

Ivanti Application Control vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Ivanti Application Control
Ranking in Application Control
7th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
No ranking in other categories
ThreatLocker Zero Trust End...
Ranking in Application Control
4th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (11th), Advanced Threat Protection (ATP) (8th), ZTNA (8th), Ransomware Protection (5th)
 

Mindshare comparison

As of February 2025, in the Application Control category, the mindshare of Ivanti Application Control is 17.8%, up from 14.1% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 11.2%, up from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Control
 

Featured Reviews

Use Ivanti Application Control?
Share your opinion
Musah Ibrahim - PeerSpot reviewer
Highly effective at controlling applications and securing our systems
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it. Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure. ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth. We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware. ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations. ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.
report
Use our free recommendation engine to learn which Application Control solutions are best for your needs.
832,138 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Government
12%
Hospitality Company
12%
Computer Software Company
8%
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
 

Also Known As

No data available
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

Sealed Air, Toshiba, Mills & Reeve
Information Not Available
Find out what your peers are saying about VMware, Check Point Software Technologies, Zscaler and others in Application Control. Updated: January 2025.
832,138 professionals have used our research since 2012.