Microsoft Defender for Endpoint and ThreatLocker Zero Trust Endpoint Protection Platform are contenders in the endpoint security category. While Microsoft Defender offers strong integration within the Microsoft ecosystem, ThreatLocker provides robust application control using a zero-trust model.
Features: Microsoft Defender for Endpoint includes comprehensive detection and response capabilities, real-time threat analytics, and cloud-based threat protection. It excels in its integration with Microsoft 365, offering robust malware protection and ease of use. ThreatLocker emphasizes preventing unauthorized access and controlling application executions through features like application allowlisting, ring-fencing, and elevation control, implementing a zero-trust model to minimize attack surfaces.
Room for Improvement: Microsoft Defender for Endpoint could enhance third-party integration, reduce alert response times, and streamline onboarding to address complexity and false positives. ThreatLocker, while secure, requires improvements in configuration complexity and ongoing management. Enhancing user interfaces and offering more flexible training and support options would benefit users.
Ease of Deployment and Customer Service: Microsoft Defender for Endpoint offers deployment across various environments, including on-premises and cloud setups, but needs more responsive technical support. ThreatLocker provides straightforward cloud deployment with commendable support, though 24-hour options are advised. Both solutions have efficient deployment capabilities but can improve customer service aspects.
Pricing and ROI: Microsoft Defender for Endpoint benefits from cost-effective pricing within Microsoft licensing bundles, suitable for organizations using Microsoft services with a flexible pricing model yielding good ROI. ThreatLocker, noted for pricing simplicity and flexibility, delivers strong value, particularly for small to medium enterprises, supporting scalable deployment without significant additional investment.
The return on investment is primarily in time savings and better observability of what's happening.
The measurable benefits of using ThreatLocker include ensuring real-time protection of organizational resources and maintaining user authentication and protection levels to reduce risks.
The level-one support seems disconnected from subject matter experts.
I rate Microsoft support 10 out of 10.
Due to our size, we don't have access to direct technical support, but the knowledge base, Microsoft Learn, and the articles available are really good.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Defender's scalability is phenomenal, and it's going to be one of the keys to resolving issues for the SOC.
It's pretty easy to scale with Microsoft, as they make it easy if you look into the documentation.
It is scalable to an extent, depending on where it is used.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
Defender for Endpoint is extremely stable.
Stability can be improved as there are times it goes down or requires management to adjust policies.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
We have multiple endpoints, and we want to look for signals across tenants.
You have to go through tons of documentation to find what you want.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
The pricing, setup, and licensing were very easy and simple.
The pricing is reasonable and normal.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
The notification and reporting features are most valuable because we are part of a compliance project, and maintaining SOC 2 compliance is critical.
Web filtering is the most valuable feature of Microsoft Defender for Endpoint because it effectively maintains security for website access.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.
With its powerful machine-learning capabilities, it can detect and block sophisticated attacks before they can cause any harm. The solution also includes endpoint detection and response (EDR) capabilities, allowing organizations to quickly investigate and respond to security incidents. It provides detailed insights into the attack timeline, enabling security teams to understand the scope and impact of an incident.
Microsoft Defender for Endpoint also offers proactive threat hunting, allowing organizations to proactively search for and identify potential threats within their network. It integrates seamlessly with other Microsoft security solutions, such as Microsoft Defender XDR, to provide a unified and holistic security approach. With its centralized management console, organizations can easily deploy, configure, and monitor the security solution across their entire network.
Microsoft Defender for Endpoint is a robust and scalable security solution that helps organizations protect their endpoints and data from evolving cyber threats.
ThreatLocker Zero Trust Endpoint Protection Platform offers robust endpoint security through application control and allowlisting, safeguarding servers and workstations from unauthorized software execution.
ThreatLocker Zero Trust Endpoint Protection Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
What are the top features of ThreatLocker?ThreatLocker Zero Trust Endpoint Protection Platform is widely implemented to safeguard IT infrastructures against unauthorized access and application use. In sectors where data security is paramount, this platform enables users to prevent unauthorized software installations and control device applications, ensuring real-time threat prevention and compliance with industry regulations.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.