G2 reviewers report that CrowdStrike Falcon excels in its ease of use, with many users appreciating its intuitive interface and quick implementation process. Recent feedback highlights the platform's continuous improvements, particularly in reporting and AI-driven features that enhance detection and response capabilities.
Users say that ThreatLocker Platform shines in its Zero Trust enforcement, effectively blocking unknown threats without relying on traditional antivirus signatures. Reviewers commend its application control features, which provide detailed insights into application usage and security, making it a strong choice for organizations prioritizing security.
According to verified reviews, CrowdStrike Falcon has a higher overall satisfaction score, reflecting its strong performance in areas like malware detection and automated remediation. Users frequently mention its advanced capabilities and the positive impact on their security operations center (SOC) efficiency.
Reviewers mention that while ThreatLocker offers a user-friendly experience, it faces challenges in ease of setup compared to CrowdStrike. Some users have noted that initial configuration can be more complex, which may require additional time and resources to fully implement.
G2 reviewers highlight the quality of support provided by ThreatLocker, which scores notably high in user feedback. Many users appreciate the responsive customer service and the helpfulness of the support team, making it a reliable option for businesses needing assistance.
Users report that CrowdStrike Falcon's strong market presence and extensive user base contribute to its credibility, with a significant number of reviews indicating a robust community and ongoing product evolution. This contrasts with ThreatLocker's smaller market segment focus, which may limit its visibility and user feedback diversity.
Pricing
Entry-Level Pricing
CrowdStrike Falcon Endpoint Protection Platform
Falcon Pro
Free Trial
Provides superior protection from cyber attacks, detects malicious activity, and offers immediate response capabilities for your business.
ThreatLocker enables IT teams to control the applications that run on their machines, and stop these applications from being exploited and weaponized. We give IT teams total control to manage and define what is, and what is not allowed, to run on their machines.
How to uninstall the CS sensor remotely from any host?
2 Comments
BB
This can be done via RTR if enabled or via deploying CS's uninstall tool through GPO, or whatever other deployment package manager you are using.Read more
How does Falcon prevent work?
1 Comment
EO
Falcon's approach to endpoint protection is centered around prevention. It uses a combination of machine learning, behavioral analysis, and threat...Read more
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
Your software and services insights are valuable.
Your peers come to G2 to get an inside look at and other business solutions. Adding perspective on will help others pick the right solution based on real user experience.