Try our new research platform with insights from 80,000+ expert users

ThreatLocker Zero Trust Endpoint Protection Platform vs VMware Carbon Black App Control comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ThreatLocker Zero Trust End...
Ranking in Application Control
4th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (11th), Advanced Threat Protection (ATP) (8th), ZTNA (8th), Ransomware Protection (5th)
VMware Carbon Black App Con...
Ranking in Application Control
1st
Average Rating
9.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2025, in the Application Control category, the mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 9.9%, up from 0.8% compared to the previous year. The mindshare of VMware Carbon Black App Control is 30.2%, down from 34.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Control
 

Featured Reviews

Musah Ibrahim - PeerSpot reviewer
Highly effective at controlling applications and securing our systems
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it. Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure. ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth. We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware. ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations. ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.
AM
We can isolate problem machines and limit their access
We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access.  More than two years. I rate Carbon Black App Control 10 out of 10 for stability. I rate App Control six out of 10 for scalability.…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"The sandbox functionality is fantastic."
"ThreatLocker Protect has improved my organization greatly."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"The visibility, reporting, and the ability to stop or prevent malicious or undesired applications from being installed are the most valuable features."
"If any malicious activity, like VAT viruses, anything RNE, ZOD malware, or something similar, comes in we know that unless we approve it, it's going to be blocked."
"I use the console to check for threats and I find it to be very user-friendly."
"The API integration is good."
"All the functions within VMware Carbon Black App Control are valuable."
"The visibility is valuable."
"We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access."
"The effectiveness of application whitelisting is very good."
 

Cons

"A valuable addition to ThreatLocker would be a column in the audit page displaying a VirusTotal score for each file."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"There are some times when applications get submitted, the hashes don't really line up."
"ThreatLocker could offer more flexible training, like online or offline classes after hours. The fact that they even provide weekly training makes it seem silly to suggest, but some people can't do it during the day, so they want to train after work. They could also start a podcast about issues they see frequently and what requires attention. A podcast would be helpful to keep us all apprised about what's going on and/or offline training for those people who can't train during the week."
"Adding applications to the allowlist can sometimes feel overwhelming."
"Its setup is very complex, and it requires guidance from the support team, but it is well worth the effort."
"I would like to see the addition of some more features that are in other, similar solutions."
"Another issue is that even sometimes if you approve, for example, Adobe as a publisher, you say any product or anything that's from Adobe has to run. It generally runs, but especially in a large environment and with a lot of users, sometimes, due to some certification validation issues or some other issue, it might stop the process from running. Genuine processes like Adobe and Chrome can get blocked. so that needs to be improved."
"The initial setup is somewhat complex."
"The solution should have overhead in keeping lists of applications that you want don't want to run."
"The reporting is not good and needs to be improved."
"Carbon Black does not use the database for identifying the file, the fields, or malware."
"I rate App Control six out of 10 for scalability."
 

Pricing and Cost Advice

"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"ThreatLocker's pricing seems justifiable."
"The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"The pricing works fine for me. It's very reasonably priced."
"We pay a fee for support, which is renewed annually."
"The pricing for this product is competitive and our customers who told us that often, Carbon Back is the cheaper solution."
"Its price is reasonable and what is expected for these types of products."
report
Use our free recommendation engine to learn which Application Control solutions are best for your needs.
831,020 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Government
5%
Educational Organization
56%
Computer Software Company
6%
Government
5%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
What do you like most about VMware Carbon Black App Control?
We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access.
What is your primary use case for VMware Carbon Black App Control?
We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access.
 

Also Known As

Protect, Allowlisting, Network Control, Ringfencing
CB Protection, Carbon Black CB Protection
 

Overview

 

Sample Customers

Information Not Available
Kaas Tailored, Core-Mark, Indeed, Hologic, Landmark Credit Union, Project Worldwide
Find out what your peers are saying about ThreatLocker Zero Trust Endpoint Protection Platform vs. VMware Carbon Black App Control and other solutions. Updated: December 2024.
831,020 professionals have used our research since 2012.