Compare Blackpoint Cyber and ThreatLocker Platform

At a Glance
Blackpoint Cyber
Blackpoint Cyber
Star Rating
(257)4.7 out of 5
Market Segments
Small-Business (82.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Blackpoint Cyber
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(473)4.8 out of 5
Market Segments
Small-Business (53.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Blackpoint Cyber excels in customer support, with users highlighting the responsiveness of their Security Operations Center (SOC). One user mentioned, "The SOC is always quick to answer my calls in the event we need to call in for an investigation into a situation!" This level of support can be crucial for businesses needing immediate assistance during security incidents.
  • Users say that ThreatLocker Platform stands out for its effective Zero-Trust enforcement, which has successfully blocked real threats without relying on traditional antivirus signatures. A user noted, "I love how ThreatLocker Platform implements effective Zero-Trust enforcement by adhering to the principle of 'trust nothing unless explicitly allowed'," showcasing its proactive approach to security.
  • Reviewers mention that Blackpoint Cyber offers a seamless user experience, particularly in terms of ease of setup and administration. Users appreciate the intuitive onboarding process, with one stating, "Blackpoint has it together when compared to the rest of my stack," indicating a smooth integration into existing workflows.
  • According to verified reviews, ThreatLocker Platform provides robust application control features that give users detailed insights into application behavior. One user expressed satisfaction with the wealth of information available, saying, "With the application control, I get a wealth of information about what applications are running," which can enhance overall security management.
  • G2 reviewers highlight that Blackpoint Cyber has a strong focus on proactive threat hunting, with users noting their effectiveness in identifying and mitigating threats before they escalate. A user remarked, "They have literally saved our own and our clients' bacon multiple times by catching and shutting down nefarious activity," emphasizing the product's reliability in critical situations.
  • Users report that while ThreatLocker Platform has a slightly higher overall star rating, Blackpoint Cyber's ease of use and setup scores are notably higher, suggesting that it may be more user-friendly for small businesses. One user appreciated the "on time reporting, good customer service, active alerts by email," indicating a well-rounded experience that could benefit smaller teams.
Pricing
Entry-Level Pricing
Blackpoint Cyber
No pricing available
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
Blackpoint Cyber
No trial information available
ThreatLocker Platform
Free Trial is available
Ratings
Meets Requirements
9.4
226
9.5
146
Ease of Use
9.2
228
8.3
286
Ease of Setup
9.4
217
8.5
272
Ease of Admin
9.2
215
8.6
138
Quality of Support
9.6
225
9.7
145
Has the product been a good partner in doing business?
9.6
218
9.7
136
Product Direction (% positive)
9.5
223
9.7
139
Features by Category
Not enough data
7.9
8
Network Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.1
7
Not enough data
6.9
6
Security
Not enough data
8.5
8
Not enough data
8.1
7
Not enough data
7.8
6
Not enough data
8.1
7
Identity Management
Not enough data
8.6
7
Not enough data
7.1
7
Not enough data
8.3
7
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.7
85
Administration
Not enough data
9.3
62
Not enough data
8.4
51
Not enough data
9.7
76
Not enough data
8.1
53
Not enough data
8.6
60
Functionality
Not enough data
9.3
53
Not enough data
9.0
54
Not enough data
9.0
26
Not enough data
8.7
50
Analysis
Not enough data
8.1
19
Not enough data
7.8
26
Not enough data
8.5
52
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
8.9
196
8.8
16
Platform Features
9.6
194
9.5
16
9.4
190
8.9
14
8.7
187
9.6
16
9.4
190
8.8
14
9.6
194
9.1
15
8.0
188
7.7
14
9.3
23
Not enough data
Automation Capabilities
9.0
188
8.3
14
9.2
187
8.2
14
6.6
17
Not enough data
Not enough data
8.9
11
Identity and Access Management - Zero Trust Platforms
Not enough data
7.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
5
Reporting and Policies - Zero Trust Platforms
Not enough data
9.0
5
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
8.8
15
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
8.6
14
Not enough data
8.6
14
Not enough data
8.5
14
Not enough data
Services - Cloud Detection and Response (CDR)
9.4
15
Not enough data
Categories
Categories
Shared Categories
Blackpoint Cyber
Blackpoint Cyber
ThreatLocker Platform
ThreatLocker Platform
Blackpoint Cyber and ThreatLocker Platform are categorized as Managed Detection and Response (MDR)
Unique Categories
Blackpoint Cyber
Blackpoint Cyber is categorized as Cloud Detection and Response (CDR)
Reviews
Reviewers' Company Size
Blackpoint Cyber
Blackpoint Cyber
Small-Business(50 or fewer emp.)
82.0%
Mid-Market(51-1000 emp.)
17.2%
Enterprise(> 1000 emp.)
0.8%
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
53.7%
Mid-Market(51-1000 emp.)
33.0%
Enterprise(> 1000 emp.)
13.2%
Reviewers' Industry
Blackpoint Cyber
Blackpoint Cyber
Information Technology and Services
52.0%
Computer & Network Security
27.3%
Consulting
2.7%
Computer Networking
2.0%
Financial Services
1.6%
Other
14.5%
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
34.3%
Computer & Network Security
18.4%
Hospital & Health Care
4.2%
Financial Services
3.6%
Accounting
2.7%
Other
36.7%
Alternatives
Blackpoint Cyber
Blackpoint Cyber Alternatives
Arctic Wolf
Arctic Wolf
Add Arctic Wolf
Huntress Managed EDR
Huntress Managed EDR
Add Huntress Managed EDR
Sophos MDR
Sophos MDR
Add Sophos MDR
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Discussions
Blackpoint Cyber
Blackpoint Cyber Discussions
Is Blackpoint cyber a SIEM?
4 Comments
NC
Not even a little bit. And no, their logging add on doesn't compare to what an actual SIEM/SOAR platform does. Read more
What is blackpoint software?
3 Comments
PS
It’s a fully managed Intrusion Detection System (IDS)Read more
Monty the Mongoose crying
Blackpoint Cyber has no more discussions with answers
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more