Microsoft Defender for Endpoint and ThreatLocker Protect are leading endpoint security solutions. While ThreatLocker Protect excels in comprehensive threat protection, Microsoft Defender for Endpoint is preferred for its robust integration with other Microsoft products.
Features: Microsoft Defender for Endpoint offers integration with Microsoft's ecosystem, real-time threat detection, and automated investigation capabilities. ThreatLocker Protect provides zero-trust architecture, application whitelisting, and rigorous security protocols.
Room for Improvement: Microsoft Defender for Endpoint could improve its reporting tools, reduce false positives, and simplify complex reporting. ThreatLocker Protect users desire more intuitive configuration settings, enhanced customer support, and an easier initial learning curve.
Ease of Deployment and Customer Service: Microsoft Defender for Endpoint benefits from straightforward deployment in Microsoft-centric infrastructures and reliable customer service. ThreatLocker Protect receives high marks for proactive customer support but has a more demanding setup process.
Pricing and ROI: Microsoft Defender for Endpoint offers competitive pricing, particularly for Microsoft ecosystem users, and demonstrates significant ROI with its comprehensive threat management. ThreatLocker Protect, while potentially more expensive, is considered worthwhile for its advanced security features.
Due to our size, we don't have access to direct technical support, but the knowledge base, Microsoft Learn, and the articles available are really good.
I rate Microsoft support 10 out of 10.
The level-one support seems disconnected from subject matter experts.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
We have multiple endpoints, and we want to look for signals across tenants.
An additional feature that could be included in the next release is free Copilot.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Defender's scalability is phenomenal, and it's going to be one of the keys to resolving issues for the SOC.
It's pretty easy to scale with Microsoft, as they make it easy if you look into the documentation.
It is scalable to an extent, depending on where it is used.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
The pricing, setup, and licensing were very easy and simple.
The pricing is reasonable and normal.
Defender for Endpoint is extremely stable.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
Stability can be improved as there are times it goes down or requires management to adjust policies.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Attack surface reduction and limiting attack surface vectors are valuable features.
The notification and reporting features are most valuable because we are part of a compliance project, and maintaining SOC 2 compliance is critical.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.
With its powerful machine-learning capabilities, it can detect and block sophisticated attacks before they can cause any harm. The solution also includes endpoint detection and response (EDR) capabilities, allowing organizations to quickly investigate and respond to security incidents. It provides detailed insights into the attack timeline, enabling security teams to understand the scope and impact of an incident.
Microsoft Defender for Endpoint also offers proactive threat hunting, allowing organizations to proactively search for and identify potential threats within their network. It integrates seamlessly with other Microsoft security solutions, such as Microsoft Defender XDR, to provide a unified and holistic security approach. With its centralized management console, organizations can easily deploy, configure, and monitor the security solution across their entire network.
Microsoft Defender for Endpoint is a robust and scalable security solution that helps organizations protect their endpoints and data from evolving cyber threats.
ThreatLocker Protect offers zero-trust security, application whitelisting, and software control across endpoints. It blocks unauthorized software, manages application installations, and prevents malicious activity for enhanced cybersecurity.
ThreatLocker Protect enhances security by blocking unauthorized software and managing application installation across endpoints. Admins receive alerts for attempts to run unapproved applications, ensuring secure environments. Utilized by MSPs, MSSPs, and IT service providers, ThreatLocker Protect integrates into security stacks to improve access control and inventory management. While the solution provides remote management through a mobile app and offers comprehensive training and support, it requires improvements in training flexibility, policy update performance, the reporting system, and custom rule management for software developers.
What are the most important features?ThreatLocker Protect is commonly implemented across industries like healthcare, finance, education, and retail to maintain strict access controls, manage application installations, and ensure endpoint security. In healthcare, it prevents unauthorized software from compromising patient data. Financial institutions use ThreatLocker Protect to guard against unauthorized transactions and data breaches. Educational institutions rely on it to manage software access for staff and students, while retail businesses use it to secure point-of-sale systems and inventory management.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.