Try our new research platform with insights from 80,000+ expert users

ThreatLocker Zero Trust Endpoint Protection Platform vs VMware Carbon Black App Control comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ThreatLocker Zero Trust End...
Ranking in Application Control
4th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (11th), Advanced Threat Protection (ATP) (8th), ZTNA (8th), Ransomware Protection (5th)
VMware Carbon Black App Con...
Ranking in Application Control
1st
Average Rating
9.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2025, in the Application Control category, the mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 11.2%, up from 1.4% compared to the previous year. The mindshare of VMware Carbon Black App Control is 26.8%, down from 32.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Control
 

Featured Reviews

Musah Ibrahim - PeerSpot reviewer
Highly effective at controlling applications and securing our systems
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it. Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure. ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth. We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware. ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations. ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.
AM
We can isolate problem machines and limit their access
We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access.  More than two years. I rate Carbon Black App Control 10 out of 10 for stability. I rate App Control six out of 10 for scalability.…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"The unified alerts are useful."
"Every single feature has been invaluable."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"ThreatLocker has significantly improved numerous techniques that mitigate vulnerabilities and viruses initiated on the back end of a network."
"If any malicious activity, like VAT viruses, anything RNE, ZOD malware, or something similar, comes in we know that unless we approve it, it's going to be blocked."
"We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access."
"The visibility is valuable."
"The effectiveness of application whitelisting is very good."
"I use the console to check for threats and I find it to be very user-friendly."
"All the functions within VMware Carbon Black App Control are valuable."
"The API integration is good."
"The visibility, reporting, and the ability to stop or prevent malicious or undesired applications from being installed are the most valuable features."
 

Cons

"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"The support could be quicker."
"The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"There are some times when applications get submitted, the hashes don't really line up."
"A valuable addition to ThreatLocker would be a column in the audit page displaying a VirusTotal score for each file."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"Its setup is very complex, and it requires guidance from the support team, but it is well worth the effort."
"The initial setup is somewhat complex."
"The reporting is not good and needs to be improved."
"Another issue is that even sometimes if you approve, for example, Adobe as a publisher, you say any product or anything that's from Adobe has to run. It generally runs, but especially in a large environment and with a lot of users, sometimes, due to some certification validation issues or some other issue, it might stop the process from running. Genuine processes like Adobe and Chrome can get blocked. so that needs to be improved."
"I would like to see the addition of some more features that are in other, similar solutions."
"Carbon Black does not use the database for identifying the file, the fields, or malware."
"I rate App Control six out of 10 for scalability."
"The solution should have overhead in keeping lists of applications that you want don't want to run."
 

Pricing and Cost Advice

"The pricing is reasonable and normal. I do not have any problems with the cost."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"ThreatLocker's pricing seems justifiable."
"The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"Its price is reasonable and what is expected for these types of products."
"We pay a fee for support, which is renewed annually."
"The pricing for this product is competitive and our customers who told us that often, Carbon Back is the cheaper solution."
report
Use our free recommendation engine to learn which Application Control solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Manufacturing Company
5%
Educational Organization
55%
Computer Software Company
6%
Financial Services Firm
5%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
What do you like most about VMware Carbon Black App Control?
We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access.
What is your primary use case for VMware Carbon Black App Control?
We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access.
 

Also Known As

Protect, Allowlisting, Network Control, Ringfencing
CB Protection, Carbon Black CB Protection
 

Overview

 

Sample Customers

Information Not Available
Kaas Tailored, Core-Mark, Indeed, Hologic, Landmark Credit Union, Project Worldwide
Find out what your peers are saying about ThreatLocker Zero Trust Endpoint Protection Platform vs. VMware Carbon Black App Control and other solutions. Updated: January 2025.
838,713 professionals have used our research since 2012.