Users report that ThreatLocker excels in "Application Control" with a score of 9.7, providing robust features that allow for precise management of application permissions. In contrast, Admin By Request, while still strong, has a slightly lower score of 9.6 in this area, indicating that ThreatLocker may offer more comprehensive control options.
Reviewers mention that ThreatLocker’s "Quality of Support" is outstanding, scoring 9.8, which suggests that users feel well-supported and valued. Admin By Request, however, has a solid score of 9.2, indicating that while support is good, it may not be as responsive or comprehensive as that of ThreatLocker.
G2 users highlight the "Ease of Use" of Admin By Request, which scored 9.6, making it a user-friendly option for those who prioritize simplicity. In comparison, ThreatLocker scored 8.5, suggesting that it may have a steeper learning curve for new users.
Users on G2 report that ThreatLocker’s "Proactive Threat Hunting" feature, with a score of 9.2, is a significant advantage, allowing for early detection of potential threats. Admin By Request does not have a comparable feature highlighted, which may be a drawback for users focused on proactive security measures.
Reviewers say that ThreatLocker’s "Temporary, time-limited privilege" feature, scoring 9.7, is particularly beneficial for organizations needing to manage user access dynamically. Admin By Request, while offering similar functionalities, does not emphasize this feature as strongly, which may limit flexibility in access management.
Users report that both products offer strong "Compliance" features, with ThreatLocker scoring 9.6 and Admin By Request at 9.4. However, reviewers mention that ThreatLocker provides more detailed compliance reporting options, which can be crucial for businesses in regulated industries.
Pricing
Entry-Level Pricing
Admin By Request
No pricing available
ThreatLocker Platform
Enterprise
Free Trial
ThreatLocker enables IT teams to control the applications that run on their machines, and stop these applications from being exploited and weaponized. We give IT teams total control to manage and define what is, and what is not allowed, to run on their machines.
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.