Try our new research platform with insights from 80,000+ expert users

Microsoft Defender for Endpoint vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.2
Users report positive ROI from Microsoft Defender for Endpoint, citing cost savings, improved security, and effective system integration.
Sentiment score
8.2
ThreatLocker enhances security and productivity with real-time protection, leading to revenue growth and improved efficiency in one year.
The return on investment is primarily in time savings and better observability of what's happening.
The measurable benefits of using ThreatLocker include ensuring real-time protection of organizational resources and maintaining user authentication and protection levels to reduce risks.
 

Customer Service

Sentiment score
6.6
Microsoft Defender for Endpoint's support is generally reliable, with mixed reviews on response time and resolution quality.
Sentiment score
8.8
ThreatLocker Zero Trust Endpoint Protection offers highly-rated, efficient customer service, with rapid response times and knowledgeable support, achieving user satisfaction.
The level-one support seems disconnected from subject matter experts.
I rate Microsoft support 10 out of 10.
Due to our size, we don't have access to direct technical support, but the knowledge base, Microsoft Learn, and the articles available are really good.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
 

Scalability Issues

Sentiment score
7.6
Microsoft Defender for Endpoint offers scalable integration and cloud-based management, but customization may need extra tools in complex settings.
Sentiment score
8.3
ThreatLocker efficiently scales for all business sizes, seamlessly managing thousands of endpoints without issues, supporting diverse infrastructures.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Defender's scalability is phenomenal, and it's going to be one of the keys to resolving issues for the SOC.
It's pretty easy to scale with Microsoft, as they make it easy if you look into the documentation.
It is scalable to an extent, depending on where it is used.
 

Stability Issues

Sentiment score
7.9
Microsoft Defender for Endpoint is stable, integrates well with Windows, but occasionally has configuration and memory issues.
Sentiment score
6.8
ThreatLocker offers stable endpoint protection, with minimal issues that are quickly resolved, enhancing reliability and performance for users.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
Defender for Endpoint is extremely stable.
Stability can be improved as there are times it goes down or requires management to adjust policies.
 

Room For Improvement

Users criticize Microsoft Defender for Endpoint's complex interface, limited integration, and request enhancements in analytics, protection, and support.
ThreatLocker could enhance its platform with flexible training, user interface improvements, better integrations, and more comprehensive support.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
We have multiple endpoints, and we want to look for signals across tenants.
You have to go through tons of documentation to find what you want.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
 

Setup Cost

Microsoft Defender for Endpoint offers flexible, cost-effective pricing, especially in E5 bundles, adapting to various enterprise licensing needs.
Enterprise users value ThreatLocker's cost-effective Zero Trust Platform for its comprehensive features, excellent support, and customizable tiered pricing.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
The pricing, setup, and licensing were very easy and simple.
The pricing is reasonable and normal.
 

Valuable Features

Microsoft Defender for Endpoint provides comprehensive cybersecurity with seamless integration, robust threat analytics, and efficient management across platforms without performance impact.
ThreatLocker offers mobile access, zero trust protection, granular control, and support, enhancing security and reducing management costs.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
The notification and reporting features are most valuable because we are part of a compliance project, and maintaining SOC 2 compliance is critical.
Web filtering is the most valuable feature of Microsoft Defender for Endpoint because it effectively maintains security for website access.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
 

Categories and Ranking

Microsoft Defender for Endp...
Ranking in Endpoint Protection Platform (EPP)
1st
Ranking in Advanced Threat Protection (ATP)
2nd
Average Rating
8.0
Reviews Sentiment
7.1
Number of Reviews
190
Ranking in other categories
Anti-Malware Tools (1st), Endpoint Detection and Response (EDR) (2nd), Microsoft Security Suite (6th)
ThreatLocker Zero Trust End...
Ranking in Endpoint Protection Platform (EPP)
12th
Ranking in Advanced Threat Protection (ATP)
8th
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Application Control (4th), ZTNA (8th), Ransomware Protection (6th)
 

Mindshare comparison

As of December 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Microsoft Defender for Endpoint is 11.5%, down from 15.9% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Sudhen Swami - PeerSpot reviewer
Easy to update with good protection and a useful cloud portal
We've mainly used it for endpoints. However, we've also used it for DLP as well. We're also in the process of implementing it for cloud and identity as well. However, it's very good for endpoints, and that's our main focus. The malware protection is good. The visibility it provides is very useful. We can combine visibility with wider security features and alerts around malware, misconfiguration, or any other kinds of threats. The cloud portal is quite good. From there, we are able to see alerts and have colleagues review issues and monitor to see if any patterns arise. It's serving us quite well overall. It allows us to look at other items, like application and browser control. It helps us prioritize threats. We have a process in place now where we can review issues and remediate them effectively. We have been able to integrate a variety of Microsoft security products together. We use Azure AD, for example, and we've begun to implement DLP, among other items. We're looking at labeling and tagging and will expand into that soon. Defender has more stringent system requirements than, for example, Check Point. So when we implemented the Check Point Endpoint agent, that solution didn't mind what version of Windows you were using. When we moved to Defender, Defender had certain system prerequisites that had to be met. So we had to make sure that we're on a minimum version of Windows when we're utilizing Office, and Office has to be a particular version as well. It has more stringent system requirements that have to be met before you can implement it. It works natively together with other Microsoft solutions. Once you get more and more of those different components across the environment, then you start to get better visibility. So, rather than having lots of different solutions, you have fewer solutions and a single vendor solution. That way, you start getting into a position where you get better visibility and integration as well. The standardization is good. It's important. It's helping me with monitoring and learning. Updates and upgrades are quite smooth and seamless. Defender helps us automate routine tasks. Quite a lot of Microsoft is straightforward for us now. Previously, we didn't have enough resources and were unable to look at the alerts. Having this in place makes things a lot more straightforward for us. We have both the technology and the people in place now, alongside the process. We do see the benefits in that, and that's why we're continuing our adoption across the estate in terms of client and server as well. It's helping us avoid looking at multiple dashboards and centralized monitoring. We're not fully there yet. We're getting there. While we haven't witnessed time saving yet, once it's fully deployed, it will. By then, we'll have standardized processes across a single solution. We have saved money, however, as we continue to reduce non-Mircosft systems. Since we won't be using various competing technologies, we can save on licensing costs. We've likely so far saved 15%. While it's hard to estimate exactly how much, the solution has helped us decrease time to detection and time to respond.
Roy Richardson - PeerSpot reviewer
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
27%
Computer Software Company
12%
Government
7%
Financial Services Firm
7%
Computer Software Company
38%
Retailer
8%
Financial Services Firm
5%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface, applies behavioral-based endpoint protection and response, and includes risk-ba...
Which offers better endpoint security - Symantec or Microsoft Defender?
We use Symantec because we do not use MS Enterprise products, but in my opinion, Microsoft Defender is a superior solution. Microsoft Defender for Endpoint is a cloud-delivered endpoint security s...
How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
The CrowdStrike solution delivers a lot of information about incidents. It has a very light sensor that will never push your machine hardware to "test", you don't have the usual "scan now" feature ...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
 

Also Known As

Microsoft Defender ATP, Microsoft Defender Advanced Threat Protection, MS Defender for Endpoint, Microsoft Defender Antivirus
Protect, Allowlisting, Network Control, Ringfencing
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

Petrofrac, Metro CSG, Christus Health
Information Not Available
Find out what your peers are saying about Microsoft Defender for Endpoint vs. ThreatLocker Zero Trust Endpoint Protection Platform and other solutions. Updated: November 2024.
824,053 professionals have used our research since 2012.