Compare Cisco Duo and ThreatLocker Platform

At a Glance
Cisco Duo
Cisco Duo
Star Rating
(497)4.5 out of 5
Market Segments
Enterprise (43.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free
Free Trial is available
Browse all 4 pricing plans
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(473)4.8 out of 5
Market Segments
Small-Business (53.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Cisco Duo excels in user experience, with many praising its multiple verification options that allow for easy identity verification across various devices. Users appreciate how this flexibility enhances their ability to access sensitive information without hassle.
  • Users say that ThreatLocker Platform stands out for its Zero Trust enforcement, effectively blocking unknown threats without relying on traditional antivirus signatures. This proactive approach to security has garnered positive feedback from users who feel more secure against zero-day ransomware.
  • Reviewers mention that Cisco Duo's implementation process is notably quick and intuitive, making it easier for organizations to onboard new users. This is highlighted by feedback that emphasizes how the platform is designed to ensure that security measures do not impede user productivity.
  • According to verified reviews, ThreatLocker Platform shines in its application control capabilities, which provide users with detailed insights into application behavior. This feature is particularly appreciated by those looking to prevent unauthorized software installations.
  • G2 reviewers highlight that while Cisco Duo has a slightly lower star rating, its overall satisfaction metrics are bolstered by a strong focus on ease of use and administration, making it a preferred choice for larger enterprises that require robust security without complexity.
  • Users express concern that while ThreatLocker Platform offers a solid security framework, its ease of use and setup scores are lower compared to Cisco Duo, indicating that some users may face challenges during initial configuration and daily operations.
Pricing
Entry-Level Pricing
Cisco Duo
Duo Free
Free
Browse all 4 pricing plans
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
Cisco Duo
Free Trial is available
ThreatLocker Platform
Free Trial is available
Ratings
Meets Requirements
9.3
388
9.5
146
Ease of Use
9.3
393
8.3
286
Ease of Setup
9.0
151
8.5
272
Ease of Admin
9.3
93
8.6
138
Quality of Support
8.9
297
9.7
145
Has the product been a good partner in doing business?
9.2
91
9.7
136
Product Direction (% positive)
8.5
375
9.7
139
Features by Category
9.3
113
Not enough data
Authentication Options
9.3
98
Not enough data
9.3
95
Not enough data
9.6
98
Not enough data
9.4
88
Not enough data
9.1
67
Not enough data
9.4
66
Not enough data
Access Control Types
9.6
82
Not enough data
9.3
84
Not enough data
9.5
90
Not enough data
9.1
69
Not enough data
9.2
73
Not enough data
Administration
9.1
78
Not enough data
9.4
77
Not enough data
9.3
75
Not enough data
9.3
78
Not enough data
9.0
77
Not enough data
Platform
9.4
84
Not enough data
9.5
79
Not enough data
9.4
79
Not enough data
9.1
68
Not enough data
9.1
70
Not enough data
9.0
67
Not enough data
9.1
70
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.5
186
Not enough data
Authentication type
8.4
144
|
Verified
Not enough data
7.8
126
|
Verified
Not enough data
8.0
120
Not enough data
8.2
122
|
Verified
Not enough data
8.8
138
|
Verified
Not enough data
8.3
122
|
Verified
Not enough data
9.3
157
|
Verified
Not enough data
8.6
120
|
Verified
Not enough data
Functionality
8.8
130
|
Verified
Not enough data
8.1
118
Not enough data
Implementation
9.0
153
|
Verified
Not enough data
8.5
116
Not enough data
8.2
113
Not enough data
8.5
46
7.9
8
Network Management
8.6
22
Feature Not Available
8.5
24
Feature Not Available
8.7
24
8.1
7
8.8
34
6.9
6
Security
9.0
24
8.5
8
9.4
35
8.1
7
8.6
23
7.8
6
9.2
26
8.1
7
Identity Management
8.8
24
8.6
7
8.5
24
7.1
7
8.7
25
8.3
7
Generative AI
6.9
12
Feature Not Available
7.1
12
Feature Not Available
8.9
38
Not enough data
Data Protection
8.9
29
Not enough data
9.1
34
Not enough data
9.0
32
Not enough data
8.7
30
Not enough data
9.4
33
Not enough data
Analysis
8.5
31
Not enough data
8.8
31
Not enough data
8.9
31
Not enough data
Administration
8.8
29
Not enough data
8.4
28
Not enough data
8.9
30
Not enough data
Biometric AuthenticationHide 7 FeaturesShow 7 Features
8.9
7
Not enough data
Integration
8.9
6
Not enough data
8.1
6
Not enough data
9.0
7
Not enough data
8.8
7
Not enough data
Administration
9.3
7
Not enough data
8.9
6
Not enough data
9.2
6
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
9.2
24
Not enough data
Administration
9.4
18
Not enough data
9.1
21
Not enough data
9.1
19
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.7
85
Administration
Not enough data
9.3
62
Not enough data
8.4
51
Not enough data
9.7
76
Not enough data
8.1
53
Not enough data
8.6
60
Functionality
Not enough data
9.3
53
Not enough data
9.0
54
Not enough data
9.0
26
Not enough data
8.7
50
Analysis
Not enough data
8.1
19
Not enough data
7.8
26
Not enough data
8.5
52
9.2
17
Not enough data
Security
9.4
13
Not enough data
9.0
13
Not enough data
9.1
13
Not enough data
9.3
14
Not enough data
Administration
9.6
15
Not enough data
9.0
14
Not enough data
9.3
14
Not enough data
Access Control
9.7
15
Not enough data
9.1
15
Not enough data
9.2
14
Not enough data
9.0
14
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
8.8
43
Not enough data
Functionality
9.0
34
Not enough data
8.8
34
Not enough data
9.2
41
Not enough data
8.0
38
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
9.0
17
Not enough data
Functionality
9.6
8
Not enough data
8.3
10
Not enough data
8.9
11
Not enough data
8.7
10
Not enough data
9.7
13
Not enough data
10.0
15
Not enough data
Type
8.7
10
Not enough data
8.2
10
Not enough data
Reporting
9.1
9
Not enough data
8.7
9
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.8
16
Platform Features
Not enough data
9.5
16
Not enough data
8.9
14
Not enough data
9.6
16
Not enough data
8.8
14
Not enough data
9.1
15
Not enough data
7.7
14
Not enough data
Not enough data
Automation Capabilities
Not enough data
8.3
14
Not enough data
8.2
14
Not enough data
Not enough data
9.7
6
8.9
11
Identity and Access Management - Zero Trust Platforms
9.7
5
7.0
5
10.0
5
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
9.0
5
9.3
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
5
Reporting and Policies - Zero Trust Platforms
Not enough data
9.0
5
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Cisco Duo
Cisco Duo
ThreatLocker Platform
ThreatLocker Platform
Cisco Duo and ThreatLocker Platform are categorized as Zero Trust Networking and Zero Trust Platforms
Reviews
Reviewers' Company Size
Cisco Duo
Cisco Duo
Small-Business(50 or fewer emp.)
18.4%
Mid-Market(51-1000 emp.)
37.9%
Enterprise(> 1000 emp.)
43.8%
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
53.7%
Mid-Market(51-1000 emp.)
33.0%
Enterprise(> 1000 emp.)
13.2%
Reviewers' Industry
Cisco Duo
Cisco Duo
Information Technology and Services
17.1%
Higher Education
12.3%
Computer Software
5.7%
Hospital & Health Care
5.3%
Education Management
4.6%
Other
55.0%
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
34.3%
Computer & Network Security
18.4%
Hospital & Health Care
4.2%
Financial Services
3.6%
Accounting
2.7%
Other
36.7%
Alternatives
Cisco Duo
Cisco Duo Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity
Add CyberArk Workforce Identity
LastPass
LastPass
Add LastPass
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
OneLogin
OneLogin
Add OneLogin
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Discussions
Cisco Duo
Cisco Duo Discussions
What is Duo Security used for?
3 Comments
Shyam Ji P.
SP
Comment deleted by user.Read more
Is Duo Security free?
3 Comments
VP
No it is not free you will need subscription.Read more
What is duo security software?
2 Comments
Pradum K.
PK
It is mostly used for Two factor authentication service for various social media platform and for sso login to the same.Read more
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more