Try our new research platform with insights from 80,000+ expert users

ThreatLocker Protect vs Total Defense Anti-Virus comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

ThreatLocker Protect
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
16
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (13th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (6th)
Total Defense Anti-Virus
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Anti-Malware Tools (41st)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. ThreatLocker Protect is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 0.7%, down 0.8% compared to last year.
Total Defense Anti-Virus, on the other hand, focuses on Anti-Malware Tools, holds 0.6% mindshare, down 1.3% since last year.
Endpoint Protection Platform (EPP)
Anti-Malware Tools
 

Featured Reviews

Roy Richardson - PeerSpot reviewer
Nov 28, 2023
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.
Use Total Defense Anti-Virus?
Share your opinion

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pricing and Cost Advice

"I find ThreatLocker's pricing to be reasonable for the services it provides."
"The pricing works fine for me. It's very reasonably priced."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"ThreatLocker's pricing seems justifiable."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
Information not available
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
37%
Retailer
7%
Government
5%
Financial Services Firm
5%
Computer Software Company
14%
Construction Company
11%
Financial Services Firm
7%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What needs improvement with ThreatLocker Allowlisting?
I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much. I've found that if a user opens a file from another location, it might trigger an approval process. The same ...
Ask a question
Earn 20 points
 

Also Known As

ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
CA Threat Manager Total Defense
 

Learn More

Video not available
 

Overview

 

Sample Customers

Information Not Available
Amazon, P. C. Richard & Son, Electronic Express, Aaron's, Conn's
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP). Updated: October 2024.
814,649 professionals have used our research since 2012.