Try our new research platform with insights from 80,000+ expert users

ThreatLocker Zero Trust Endpoint Protection Platform vs VMware Carbon Black App Control comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 5, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ThreatLocker Zero Trust End...
Ranking in Application Control
1st
Average Rating
9.2
Reviews Sentiment
7.4
Number of Reviews
40
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (6th), Advanced Threat Protection (ATP) (7th), ZTNA (4th), Ransomware Protection (1st)
VMware Carbon Black App Con...
Ranking in Application Control
3rd
Average Rating
9.2
Reviews Sentiment
6.8
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2025, in the Application Control category, the mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 21.0%, up from 9.6% compared to the previous year. The mindshare of VMware Carbon Black App Control is 13.2%, down from 28.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Control Market Share Distribution
ProductMarket Share (%)
ThreatLocker Zero Trust Endpoint Protection Platform21.0%
VMware Carbon Black App Control13.2%
Other65.8%
Application Control
 

Featured Reviews

CL
Supervisor, Client Security at a consultancy with 11-50 employees
World-class support and highly effective for application control and elevation
Their product is solid. I have a hard time complaining much about it because when we do find little things, they are usually interface-related or related to things that would be nice to have. Their idea portal, unlike so many other vendors we deal with, shows movement. At least four to eight features of ThreatLocker exist because I made a request in the last five years, and it became a feature of the actual product. When it comes to improvements, we moved the product as customers, and we got to move the product by making suggestions. They seem to be very reactive to it, so there is not a whole lot that they actively need to change right now. It is one of those situations where when we run into something that would be nice to have, it happens. They make it work.
AM
Cybersecurity Consultant at KAFD DMC
We can isolate problem machines and limit their access
We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access.  More than two years. I rate Carbon Black App Control 10 out of 10 for stability. I rate App Control six out of 10 for scalability.…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is its learning capability."
"Overall, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a ten out of ten."
"The application control is a key feature of ThreatLocker."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"The unified alerts are useful."
"ThreatLocker Zero Trust Endpoint Protection Platform has helped us protect our environments and have more meaningful requests for access as well as meaningful logging for response."
"It is a comprehensive platform that allows you to do a lot of things."
"Overall, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a ten out of ten."
"The visibility, reporting, and the ability to stop or prevent malicious or undesired applications from being installed are the most valuable features."
"All the functions within VMware Carbon Black App Control are valuable."
"If any malicious activity, like VAT viruses, anything RNE, ZOD malware, or something similar, comes in we know that unless we approve it, it's going to be blocked."
"We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access."
"The visibility is valuable."
"The effectiveness of application whitelisting is very good."
"The API integration is good."
"I use the console to check for threats and I find it to be very user-friendly."
 

Cons

"There could be options for handling a bulk amount of machines simultaneously."
"One of the things I would really like is the ability to create custom groups and assign machines to them."
"It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
"It is a little frustrating on my end since I like to go as quickly as I possibly can, and it slows me down."
"The reporting could be improved."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"We use other vendors for other components. I'd like one vendor to control all aspects of the business, including backup, EDR solutions, email monitoring, and control, rather than using multiple vendors."
"The solution should have overhead in keeping lists of applications that you want don't want to run."
"Another issue is that even sometimes if you approve, for example, Adobe as a publisher, you say any product or anything that's from Adobe has to run. It generally runs, but especially in a large environment and with a lot of users, sometimes, due to some certification validation issues or some other issue, it might stop the process from running. Genuine processes like Adobe and Chrome can get blocked. so that needs to be improved."
"I rate App Control six out of 10 for scalability."
"Its setup is very complex, and it requires guidance from the support team, but it is well worth the effort."
"Carbon Black does not use the database for identifying the file, the fields, or malware."
"The reporting is not good and needs to be improved."
"I would like to see the addition of some more features that are in other, similar solutions."
"The initial setup is somewhat complex."
 

Pricing and Cost Advice

"We have encountered a few challenges regarding pricing, contract renewals, and additions. As we explored adding features like Cyber Hero, it proved to be an increased expense for our clients. This was primarily a mistake on our part due to how we initially priced it to clients."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"The pricing works fine for me. It's very reasonably priced."
"The pricing is pretty fair, considering other solutions. Licensing-wise, it did not take long."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"The pricing is fair and there is no hard sell."
"I do not deal with pricing, but I assume it is cost-effective for us. We choose a solution based on functionality and affordability."
"We pay a fee for support, which is renewed annually."
"Its price is reasonable and what is expected for these types of products."
"The pricing for this product is competitive and our customers who told us that often, Carbon Back is the cheaper solution."
report
Use our free recommendation engine to learn which Application Control solutions are best for your needs.
879,259 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
25%
Retailer
8%
Manufacturing Company
8%
Financial Services Firm
7%
Financial Services Firm
16%
Computer Software Company
9%
Construction Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business32
Midsize Enterprise4
Large Enterprise3
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise1
Large Enterprise3
 

Questions from the Community

What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
Pricing, setup costs, and licensing have been pretty accessible and manageable. It was not too expensive to get started, especially at a small scale for a smaller MSP. It is very accessible, easy t...
What needs improvement with ThreatLocker Allowlisting?
Going with the theme of ThreatLocker Zero Trust Endpoint Protection Platform being a one-stop shop where they have just about everything, and they have a really good product stack as is. However, t...
Ask a question
Earn 20 points
 

Also Known As

Protect, Allowlisting, Network Control, Ringfencing
CB Protection, Carbon Black CB Protection
 

Overview

 

Sample Customers

Information Not Available
Kaas Tailored, Core-Mark, Indeed, Hologic, Landmark Credit Union, Project Worldwide
Find out what your peers are saying about ThreatLocker Zero Trust Endpoint Protection Platform vs. VMware Carbon Black App Control and other solutions. Updated: December 2025.
879,259 professionals have used our research since 2012.