G2 reviewers report that ThreatLocker Platform excels in user satisfaction, boasting a significantly higher overall rating compared to Carbon Black Cloud. Users appreciate its application control features, which allow IT teams to easily manage user activities and maintain security protocols.
According to verified reviews, Carbon Black Cloud is noted for its ease of installation and effective protection capabilities. Users highlight its intuitive interface and the ability to maintain block and whitelist lists effortlessly, making it a solid choice for those prioritizing straightforward setup.
Users say that ThreatLocker Platform offers exceptional support, with a high quality of assistance reported by reviewers. This is particularly beneficial for small businesses that may require more hands-on guidance during implementation and ongoing use.
Reviewers mention that while Carbon Black Cloud provides good protection, it sometimes struggles to meet specific workflow needs, leading to configuration challenges. This can be a drawback for organizations with unique security requirements.
G2 reviewers highlight that ThreatLocker Platform's unified auditing function is a standout feature, allowing for easy tracking of application installations and usage history. This capability is particularly useful for troubleshooting and maintaining compliance.
According to recent user feedback, both platforms are relatively easy to use, but ThreatLocker Platform edges out slightly with its clean interface and fast deployment via RMM tools, making it a preferred choice for teams looking for efficiency in their security solutions.
Pricing
Entry-Level Pricing
Carbon Black Cloud
No pricing available
ThreatLocker Platform
Enterprise
Free Trial
ThreatLocker enables IT teams to control the applications that run on their machines, and stop these applications from being exploited and weaponized. We give IT teams total control to manage and define what is, and what is not allowed, to run on their machines.
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.