Try our new research platform with insights from 80,000+ expert users

Panda Adaptive Defense 360 vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 23, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Panda Adaptive Defense 360
Ranking in Endpoint Protection Platform (EPP)
29th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
28
Ranking in other categories
Endpoint Detection and Response (EDR) (23rd)
ThreatLocker Zero Trust End...
Ranking in Endpoint Protection Platform (EPP)
6th
Average Rating
9.2
Reviews Sentiment
7.6
Number of Reviews
39
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (6th), Application Control (2nd), ZTNA (3rd), Ransomware Protection (3rd)
 

Mindshare comparison

As of April 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Panda Adaptive Defense 360 is 1.6%, up from 1.2% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

PaolaLamura - PeerSpot reviewer
While being easy to manage and create reports, the tool also offers a good UI
I rate the ease of use and management of Panda Adaptive Defense 360 an eight on a scale of one to ten. The tool's ability to provide information about the vulnerability is the most impactful feature of the product that has an impact on our company's security posture. Speaking about scenarios where the solution effectively prevented the security breach, I would say that our company sees how the tool blocks when our customers accidentally click on some malware, after which it quarantines that file. My company makes a playbook with the SOAR tool that Panda Adaptive Defense 360 uses to block and isolate attacks. In our company's system, if there is a big event that occurs, then to block the endpoint, we use SOAR with Panda Adaptive Defense 360 to block and isolate attacks or threats. The solution's real-time monitoring has improved our company's ability to detect threats if we use it in our company with Panda SIEMFeeder. Only if in my company there is a need to do some research, prepare a report, or if we want to change the policy, so it is not very often that we use the visualization part of the tool in our company. The reporting and analytics part of the tool has helped with the decision-making in our company since we combine different kinds of logs and situations from different ingestion logs, and we can configure a specific alert. In my company, we use the tool's data search functionality if required to check the information we need. Presently, our company uses the configuration alert and SIEMFeeder in our system. I rate the tool a nine out of ten.
Johnathan Bodily - PeerSpot reviewer
Ensures ransomware protection and reduces phishing chaos
The application control has been great so far, and while I am still exploring the network access controls, I unfortunately don't have access to one module I would love to have due to licensing restrictions. It's easy to use in regard to reducing attack surfaces. For me, it's a piece of cake. We can have something approved within 30 seconds, thanks to the mobile app. We haven't eliminated security solutions. We just add to it, and ThreatLocker has been a great addition. We also have Kaseya and ThreatLocker as a supplement to that. It's useful. They have overlap, and we look at the overlap as a good thing. It's helped your organization save on operational costs or expenses by ensuring that many fewer hours are spent dealing with ransomware nonsense. I cannot count the amount of hours that I personally have not had to put in to recovering an environment from a ransomware event. The last big one took us about three weeks to completely recover from. Since we've grouped ThreatLocker in, the management of that whole setup has gone down to just daily help desk tasks and general server maintenance instead of having the whole system on fire. There are probably thousands of hours of saved time between our teams. It's been great so far. ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications is great. It's my biggest protection, the blocked applications. In a lot of cases, you go to install something yourself that you need for management, and it comes in and says, nope. And then I have to log into the portal and approve it. I get our other guys saying, hey, why are you trying to approve something? Any of the tools that I'm using on a day-to-day basis that haven't been in the environment during the whole learning mode initially, I could go through and set extensions and all that. So, while it's a headache on that end, the amount of saved time I can't even count. It is a little frustrating on my end since I like to go as quickly as I possibly can, and it slows me down. However, that's a really good thing. Depending on the site, it can save a lot of time and cut down headaches. It's likely saved a week's worth of time. It's cut down the amount of sever help desk tickets. Those have become minimal.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The detection capabilities for malicious activities are effective."
"Panda Security solution has a feature to block any unknown process and that is what is best about it."
"The most valuable feature of Panda Security Adaptive Defense is we don't have to have dedicated infrastructure on-premise because it is cloud-based."
"Their remote management (RMM) is very good."
"The product so far has been good at protecting us. We haven't faced a breach."
"The interface is great."
"Great technical support staff."
"The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily."
"Being able to protect and trust nothing by default, known as zero trust, is the most important feature to me."
"The sandbox functionality is fantastic."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"Unified Audit is excellent for identifying our denies and using those to dynamically create rules, as opposed to manually observing the logs and creating them. It saves so much time."
"Being able to protect and trust nothing by default, known as zero trust, is the most important feature to me."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"A few years back, we had an attack on one of our biggest clients."
"ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files."
 

Cons

"They could have more reports."
"We do get the odd false positive when we're trying to install the software."
"t would help if it would monitor the network better."
"Improvements could be made in terms of how the reporting is structured."
"For some urgent updates, I don't like the need for the tool to be frequently restarted."
"The software has performance issues due to its requirements on the processor."
"Panda Adaptive Defense 360 is not compatible with certain network devices like access points, switches, or routers, which would be an area for improvement."
"Panda Security Adaptive Defense is stable. However, when updates are being done on the computers we can experience some troubles because the computers need to be restarted. When we start the computers they are not functioning correctly and we have not received proper feedback regarding this random issue."
"Scalability is challenging, not due to the platform. Scaling ThreatLocker Zero Trust Endpoint Protection Platform usage requires dedicated resources for maintenance."
"The user experience could be improved. Most complaints we get are based on users wanting certain functionality."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
"It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"It is a little frustrating on my end since I like to go as quickly as I possibly can, and it slows me down."
"More visibility in the built-ins would be nice."
"Better visualizations of what exactly is happening in our logs would be helpful. There can be more visuals on what has been elevated. Presenting this in a more refined manner would be beneficial."
 

Pricing and Cost Advice

"Our licensing fee is 1M Euro per month, so it is about 80 Euro's per user."
"The price of this solution depends on the number of licenses that you are purchasing."
"The solution is priced well for what features it provides."
"The licensing is subscription-based and priced well compared to other endpoint security solutions."
"Customers need to pay monthly licensing costs for Panda Security Adaptive Defense, which is not expensive."
"There is a license needed to use this solution and it is approximately $30 annually."
"I don't think Panda's license is too expensive, but they're charging more than it's worth. It's a yearly license. For 1,000 endpoints, it's around $18,000."
"Panda is cloud-only and comes at a reasonable cost. It is a set price per seat."
"We have encountered a few challenges regarding pricing, contract renewals, and additions. As we explored adding features like Cyber Hero, it proved to be an increased expense for our clients. This was primarily a mistake on our part due to how we initially priced it to clients."
"ThreatLocker's pricing seems justifiable."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"The pricing works fine for me. It's very reasonably priced."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Comms Service Provider
13%
Hospitality Company
8%
Financial Services Firm
6%
Computer Software Company
37%
Retailer
8%
Manufacturing Company
5%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Panda Security Adaptive Defense?
The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily.
What is your experience regarding pricing and costs for Panda Security Adaptive Defense?
Although it is not a cheap solution, it is satisfying and functional. It is worth the money and provides good return on investment.
What needs improvement with Panda Security Adaptive Defense?
The software has performance issues due to its requirements on the processor, however, these issues are common with other vendors, not just WatchGuard.
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
We have encountered a few challenges regarding pricing, contract renewals, and additions. As we explored adding features like Cyber Hero, it proved to be an increased expense for our clients. This ...
What needs improvement with ThreatLocker Allowlisting?
I find that the learning mode is too accessible. Technicians sometimes default to it instead of manually building policy controls. I would prefer the learning mode to be harder to access, ideally h...
 

Also Known As

Panda Security Endpoint Protection, Panda Security for Desktops
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

Indra, Valea AB, Fineit, Aemcom, Data Solutions INC., Gloucestershire NHS, Golden Star Resources Ltd, Hispania Racing Team, Instituto Dos Museus e da ConserÊo, Escuelas Pias Provincia Emaus, Axiom Housing Association, Municipality of Bjuv, Lesedi Nuclear, Mullsj_ municipality, Eng. skolan Norr AB, Dalakraft AB, Peter Green Haulage Ltd
Information Not Available
Find out what your peers are saying about Panda Adaptive Defense 360 vs. ThreatLocker Zero Trust Endpoint Protection Platform and other solutions. Updated: March 2025.
846,617 professionals have used our research since 2012.