Introducing G2.ai, the future of software buying.Try now

Compare Admin By Request and ThreatLocker Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Admin By Request
Admin By Request
Star Rating
(16)4.8 out of 5
Market Segments
Mid-Market (43.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Admin By Request
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(294)4.8 out of 5
Market Segments
Small-Business (61.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that ThreatLocker excels in "Application Control" with a score of 9.7, providing robust features that allow for precise management of application permissions. In contrast, Admin By Request, while still strong, has a slightly lower score of 9.6 in this area, indicating that ThreatLocker may offer more comprehensive control options.
  • Reviewers mention that ThreatLocker’s "Quality of Support" is outstanding, scoring 9.8, which suggests that users feel well-supported and valued. Admin By Request, however, has a solid score of 9.2, indicating that while support is good, it may not be as responsive or comprehensive as that of ThreatLocker.
  • G2 users highlight the "Ease of Use" of Admin By Request, which scored 9.6, making it a user-friendly option for those who prioritize simplicity. In comparison, ThreatLocker scored 8.5, suggesting that it may have a steeper learning curve for new users.
  • Users on G2 report that ThreatLocker’s "Proactive Threat Hunting" feature, with a score of 9.2, is a significant advantage, allowing for early detection of potential threats. Admin By Request does not have a comparable feature highlighted, which may be a drawback for users focused on proactive security measures.
  • Reviewers say that ThreatLocker’s "Temporary, time-limited privilege" feature, scoring 9.7, is particularly beneficial for organizations needing to manage user access dynamically. Admin By Request, while offering similar functionalities, does not emphasize this feature as strongly, which may limit flexibility in access management.
  • Users report that both products offer strong "Compliance" features, with ThreatLocker scoring 9.6 and Admin By Request at 9.4. However, reviewers mention that ThreatLocker provides more detailed compliance reporting options, which can be crucial for businesses in regulated industries.
Pricing
Entry-Level Pricing
Admin By Request
No pricing available
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
Admin By Request
Free Trial is available
ThreatLocker Platform
Free Trial is available
Ratings
Meets Requirements
9.2
16
9.6
140
Ease of Use
9.5
16
8.3
246
Ease of Setup
9.2
14
8.5
234
Ease of Admin
9.4
15
8.6
134
Quality of Support
9.2
12
9.8
139
Has the product been a good partner in doing business?
9.9
15
9.7
132
Product Direction (% positive)
10.0
15
9.7
133
Features by Category
Not enough data
Not enough data
Authentication Options
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access Control Types
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Platform
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Authentication type
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Implementation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.5
7
Network Management
Not enough data
Feature Not Available
Not enough data
3.8
7
Not enough data
8.1
7
Not enough data
6.9
6
Security
Not enough data
8.3
7
Not enough data
8.1
7
Not enough data
7.8
6
Not enough data
8.1
7
Identity Management
Not enough data
8.6
7
Not enough data
7.1
7
Not enough data
8.3
7
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
9.0
13
Not enough data
Administration
9.4
12
Not enough data
9.9
13
Not enough data
9.3
12
Not enough data
8.9
9
Not enough data
9.4
12
Not enough data
9.3
12
Not enough data
Functionality
8.8
10
Not enough data
9.7
12
Not enough data
7.8
9
Not enough data
Feature Not Available
Not enough data
8.5
11
Not enough data
9.3
10
Not enough data
8.9
9
Not enough data
6.9
7
Not enough data
7.3
8
Not enough data
9.5
11
Not enough data
Monitoring
9.5
11
Not enough data
9.5
11
Not enough data
8.9
9
Not enough data
Reporting
9.5
13
Not enough data
9.5
13
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.7
58
Administration
Not enough data
9.2
55
Not enough data
8.4
49
Not enough data
9.7
55
Not enough data
8.1
52
Not enough data
8.5
56
Functionality
Not enough data
9.3
52
Not enough data
8.9
49
Not enough data
9.0
24
Not enough data
8.8
47
Analysis
Not enough data
8.1
18
Not enough data
7.8
23
Not enough data
8.5
51
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.8
15
Platform Features
Not enough data
9.4
15
Not enough data
8.9
14
Not enough data
9.6
15
Not enough data
8.8
14
Not enough data
9.1
15
Not enough data
7.7
14
Not enough data
Not enough data
Automation Capabilities
Not enough data
8.3
14
Not enough data
8.2
14
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Admin By Request
Admin By Request
ThreatLocker Platform
ThreatLocker Platform
Admin By Request and ThreatLocker Platform share no categories
Reviews
Reviewers' Company Size
Admin By Request
Admin By Request
Small-Business(50 or fewer emp.)
18.8%
Mid-Market(51-1000 emp.)
43.8%
Enterprise(> 1000 emp.)
37.5%
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
61.8%
Mid-Market(51-1000 emp.)
31.7%
Enterprise(> 1000 emp.)
6.5%
Reviewers' Industry
Admin By Request
Admin By Request
Information Technology and Services
25.0%
Consulting
12.5%
Computer Software
12.5%
Sports
6.3%
Research
6.3%
Other
37.5%
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
37.5%
Computer & Network Security
19.1%
Hospital & Health Care
4.1%
Accounting
3.1%
Government Administration
2.7%
Other
33.4%
Alternatives
Admin By Request
Admin By Request Alternatives
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
BeyondTrust Remote Support
BeyondTrust Remote Support
Add BeyondTrust Remote Support
JumpCloud
JumpCloud
Add JumpCloud
LastPass
LastPass
Add LastPass
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Discussions
Admin By Request
Admin By Request Discussions
Monty the Mongoose crying
Admin By Request has no discussions with answers
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more