Introducing G2.ai, the future of software buying.Try now

Compare Adlumin and ThreatLocker Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Adlumin
Adlumin
Star Rating
(54)4.7 out of 5
Market Segments
Mid-Market (64.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us With One-Time Purchase
Free Trial is available
Learn more about Adlumin
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(294)4.8 out of 5
Market Segments
Small-Business (61.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that the ThreatLocker Platform excels in user satisfaction, boasting a higher overall score compared to Adlumin. Users appreciate its application control features, which allow IT teams to manage user activities effectively, ensuring that only approved applications can run.
  • According to verified reviews, ThreatLocker Platform has a significant advantage in the number of reviews, indicating a broader user base and more reliable feedback. With 293 reviews compared to Adlumin's 53, users feel more confident in the insights shared about ThreatLocker.
  • Users say that ThreatLocker Platform's implementation process is notably quick and straightforward, with many highlighting its clean interface and ease of deployment through RMM tools. This contrasts with Adlumin, where some users have expressed a desire for more streamlined setup experiences.
  • Reviewers mention that while Adlumin offers a solid user experience with its intuitive design and outstanding support, it faces challenges in certain areas like customizable reporting. Users have noted that ThreatLocker provides more robust options for tracking application activities, which can be crucial for troubleshooting.
  • According to recent feedback, both platforms receive high marks for support, but ThreatLocker Platform stands out with its exceptional quality of support. Users have praised its proactive approach, stating that the platform acts as a true partner in security, which is a key differentiator in user experience.
  • Users highlight that Adlumin shines in its detailed analytic reports and continuous innovation, making it a strong contender for organizations looking for a security partner. However, ThreatLocker Platform's focus on application control and unified auditing functions provides a more comprehensive security management experience for many users.
Pricing
Entry-Level Pricing
Adlumin
25% Off Security Operations Platform Offer
Contact Us
With One-Time Purchase
Learn more about Adlumin
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
Adlumin
Free Trial is available
ThreatLocker Platform
Free Trial is available
Ratings
Meets Requirements
9.3
46
9.6
140
Ease of Use
9.2
46
8.3
246
Ease of Setup
9.1
43
8.5
234
Ease of Admin
8.9
39
8.6
134
Quality of Support
9.4
46
9.8
139
Has the product been a good partner in doing business?
9.4
39
9.7
132
Product Direction (% positive)
9.7
46
9.7
133
Features by Category
Not enough data
7.5
7
Network Management
Not enough data
Feature Not Available
Not enough data
3.8
7
Not enough data
8.1
7
Not enough data
6.9
6
Security
Not enough data
8.3
7
Not enough data
8.1
7
Not enough data
7.8
6
Not enough data
8.1
7
Identity Management
Not enough data
8.6
7
Not enough data
7.1
7
Not enough data
8.3
7
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.7
58
Administration
Not enough data
9.2
55
Not enough data
8.4
49
Not enough data
9.7
55
Not enough data
8.1
52
Not enough data
8.5
56
Functionality
Not enough data
9.3
52
Not enough data
8.9
49
Not enough data
9.0
24
Not enough data
8.8
47
Analysis
Not enough data
8.1
18
Not enough data
7.8
23
Not enough data
8.5
51
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
8.7
17
Not enough data
Risk Analysis
9.2
16
Not enough data
9.1
16
Not enough data
8.9
15
Not enough data
Vulnerability Assesment
8.4
15
Not enough data
8.7
15
Not enough data
8.6
13
Not enough data
8.8
15
Not enough data
Automation
8.6
14
Not enough data
8.6
12
Not enough data
8.6
13
Not enough data
8.3
11
Not enough data
Security Awareness TrainingHide 11 FeaturesShow 11 Features
9.0
5
Not enough data
Assesment
Not enough data
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
Training
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
8.7
5
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Detection & Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
9.0
21
8.8
15
Platform Features
9.7
20
9.4
15
9.5
19
8.9
14
8.5
18
9.6
15
8.8
18
8.8
14
9.2
20
9.1
15
8.7
18
7.7
14
Not enough data
Not enough data
Automation Capabilities
8.7
20
8.3
14
8.5
19
8.2
14
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
8.6
14
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
8.7
13
Not enough data
8.7
13
Not enough data
8.1
12
Not enough data
8.6
12
Not enough data
Detection
8.7
13
Not enough data
8.8
12
Not enough data
8.8
14
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
8.9
29
Not enough data
Network Management
9.4
28
Not enough data
8.1
20
Not enough data
9.2
26
Not enough data
Incident Management
9.2
26
Not enough data
8.7
24
Not enough data
8.8
26
Not enough data
Security Intelligence
9.1
27
Not enough data
8.5
23
Not enough data
9.1
25
Not enough data
8.8
24
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Adlumin
Adlumin
Small-Business(50 or fewer emp.)
18.9%
Mid-Market(51-1000 emp.)
64.2%
Enterprise(> 1000 emp.)
17.0%
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
61.8%
Mid-Market(51-1000 emp.)
31.7%
Enterprise(> 1000 emp.)
6.5%
Reviewers' Industry
Adlumin
Adlumin
Financial Services
18.9%
Banking
11.3%
Legal Services
9.4%
Information Technology and Services
9.4%
Hospital & Health Care
5.7%
Other
45.3%
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
37.5%
Computer & Network Security
19.1%
Hospital & Health Care
4.1%
Accounting
3.1%
Government Administration
2.7%
Other
33.4%
Alternatives
Adlumin
Adlumin Alternatives
Arctic Wolf
Arctic Wolf
Add Arctic Wolf
Huntress Managed EDR
Huntress Managed EDR
Add Huntress Managed EDR
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos MDR
Sophos MDR
Add Sophos MDR
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Discussions
Adlumin
Adlumin Discussions
Monty the Mongoose crying
Adlumin has no discussions with answers
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more