Try our new research platform with insights from 80,000+ expert users

Safe-T Secure Application Access vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 23, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Safe-T Secure Application A...
Ranking in ZTNA
26th
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
Enterprise Infrastructure VPN (42nd), Access Management (28th)
ThreatLocker Zero Trust End...
Ranking in ZTNA
3rd
Average Rating
9.2
Reviews Sentiment
7.6
Number of Reviews
39
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (6th), Advanced Threat Protection (ATP) (6th), Application Control (2nd), Ransomware Protection (3rd)
 

Mindshare comparison

As of April 2025, in the ZTNA category, the mindshare of Safe-T Secure Application Access is 0.6%, up from 0.2% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 1.0%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
ZTNA
 

Featured Reviews

it_user790473 - PeerSpot reviewer
The architecture is open to integration and development, making the product very flexible
We have a lot of in-house applications that we must integrate with a secure email system. We are a financial institute, so we must use it to send emails to our customers securely, because these emails contain sensitive customer data. The architecture of the product is very open to development, plug-ins and integration with in-house systems. We have been able integrate this system into our CRM and other operational systems. We didn't find that kind of flexibility in other secure email products. We have also been able to customize the user interface so it is branded and able to "talk" our marketing language. There is also a local Israeli vendor that helps us to improve the product, add the new features.
Johnathan Bodily - PeerSpot reviewer
Ensures ransomware protection and reduces phishing chaos
The application control has been great so far, and while I am still exploring the network access controls, I unfortunately don't have access to one module I would love to have due to licensing restrictions. It's easy to use in regard to reducing attack surfaces. For me, it's a piece of cake. We can have something approved within 30 seconds, thanks to the mobile app. We haven't eliminated security solutions. We just add to it, and ThreatLocker has been a great addition. We also have Kaseya and ThreatLocker as a supplement to that. It's useful. They have overlap, and we look at the overlap as a good thing. It's helped your organization save on operational costs or expenses by ensuring that many fewer hours are spent dealing with ransomware nonsense. I cannot count the amount of hours that I personally have not had to put in to recovering an environment from a ransomware event. The last big one took us about three weeks to completely recover from. Since we've grouped ThreatLocker in, the management of that whole setup has gone down to just daily help desk tasks and general server maintenance instead of having the whole system on fire. There are probably thousands of hours of saved time between our teams. It's been great so far. ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications is great. It's my biggest protection, the blocked applications. In a lot of cases, you go to install something yourself that you need for management, and it comes in and says, nope. And then I have to log into the portal and approve it. I get our other guys saying, hey, why are you trying to approve something? Any of the tools that I'm using on a day-to-day basis that haven't been in the environment during the whole learning mode initially, I could go through and set extensions and all that. So, while it's a headache on that end, the amount of saved time I can't even count. It is a little frustrating on my end since I like to go as quickly as I possibly can, and it slows me down. However, that's a really good thing. Depending on the site, it can save a lot of time and cut down headaches. It's likely saved a week's worth of time. It's cut down the amount of sever help desk tickets. Those have become minimal.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"Safe-T is very good for users because it has plug-in for Outlook."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"With ThreatLocker, we don't have shadow IT, and it has reduced ransomware."
"ThreatLocker’s support has been second to none."
"The solution has made knowing and managing what is running on our clients' devices much easier for us. We know they cannot run what they are not supposed to run."
"Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc."
"It is a comprehensive platform that allows you to do a lot of things."
"Overall, everything is excellent, and everything is well-prepared, from the laptops provided to the overall setup."
"ThreatLocker has significantly improved numerous techniques that mitigate vulnerabilities and viruses initiated on the back end of a network."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
 

Cons

"The Outlook agent is not working well for installing it in the entire office."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
"Identifying areas of improvement is challenging, however, perhaps adding a few more built-ins could help."
"I find that the learning mode is too accessible. Technicians sometimes default to it instead of manually building policy controls."
"Initially, the learning curve was slightly high for me, however, that has been resolved now."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"Scalability is challenging, not due to the platform. Scaling ThreatLocker Zero Trust Endpoint Protection Platform usage requires dedicated resources for maintenance."
"This is my first Zero Trust conference, and so far, it has been good. The only thing I have noticed is that sometimes they encounter technical issues. For example, in one of the demo labs, the laptop trying to connect to the projector was not working, which affected the demonstration of the victim versus attacker laptop scenarios. It would be helpful to fix these issues."
"A valuable addition to ThreatLocker would be a column in the audit page displaying a VirusTotal score for each file."
"I have encountered some problems with stability, however, they are resolved quickly."
 

Pricing and Cost Advice

Information not available
"I do not know about the licensing and price as it comes bundled from our MSP. However, it seems fairly reasonable for us, which is why we chose it."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"The pricing is fair and there is no hard sell."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
report
Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
37%
Retailer
8%
Manufacturing Company
5%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
We have encountered a few challenges regarding pricing, contract renewals, and additions. As we explored adding features like Cyber Hero, it proved to be an increased expense for our clients. This ...
What needs improvement with ThreatLocker Allowlisting?
I find that the learning mode is too accessible. Technicians sometimes default to it instead of manually building policy controls. I would prefer the learning mode to be harder to access, ideally h...
 

Also Known As

Safe-T SDA, Safe-T, Safe-T Software-Defined Access
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Information Not Available
Find out what your peers are saying about Safe-T Secure Application Access vs. ThreatLocker Zero Trust Endpoint Protection Platform and other solutions. Updated: March 2025.
846,617 professionals have used our research since 2012.