Compare Heimdal and ThreatLocker Platform

At a Glance
Heimdal
Heimdal
Star Rating
(48)4.3 out of 5
Market Segments
Mid-Market (59.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Heimdal
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(473)4.8 out of 5
Market Segments
Small-Business (53.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that ThreatLocker Platform excels in user satisfaction, boasting a significantly higher overall score compared to Heimdal. Users appreciate features like application control, which allows IT teams to manage user activities effectively, ensuring that only approved applications can run.
  • According to verified reviews, ThreatLocker Platform has a robust implementation process, with users highlighting its fast deployment via RMM tools and a clean, intuitive interface. This ease of setup contrasts with Heimdal, where some users find the interface straightforward but less flexible in meeting specific needs.
  • Users say that ThreatLocker Platform provides exceptional support, with a quality rating that stands out. Reviewers mention the unified auditing function as a key feature that simplifies troubleshooting, while Heimdal also receives praise for its 24/7 technician availability, ensuring users feel supported at all times.
  • Reviewers mention that ThreatLocker Platform is particularly well-suited for small businesses, with a majority of its reviews coming from this segment. In contrast, Heimdal is favored by mid-market users, which may influence the relevance of features depending on the size and needs of the organization.
  • Users appreciate the accessibility of ThreatLocker Platform for both end users and IT administrators, allowing for elevated access while maintaining security focus. Heimdal, while offering robust security features, is noted for its auto-updating capabilities, which help users keep essential applications current without manual intervention.
  • According to recent feedback, ThreatLocker Platform's product direction is viewed positively, with users feeling confident in its future developments. Heimdal, while reliable, has received mixed reviews regarding its long-term vision, which may affect users' perceptions of its ongoing value.
Pricing
Entry-Level Pricing
Heimdal
No pricing available
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
Heimdal
Free Trial is available
ThreatLocker Platform
Free Trial is available
Ratings
Meets Requirements
8.8
39
9.5
146
Ease of Use
8.5
39
8.3
284
Ease of Setup
8.3
29
8.5
270
Ease of Admin
8.3
29
8.6
138
Quality of Support
9.6
38
9.7
145
Has the product been a good partner in doing business?
9.4
29
9.7
136
Product Direction (% positive)
7.3
35
9.7
139
Features by Category
Not enough data
7.9
8
Network Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.1
7
Not enough data
6.9
6
Security
Not enough data
8.5
8
Not enough data
8.1
7
Not enough data
7.8
6
Not enough data
8.1
7
Identity Management
Not enough data
8.6
7
Not enough data
7.1
7
Not enough data
8.3
7
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
9.4
7
Not enough data
Administration
9.2
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.2
6
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
9.0
5
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
9.7
5
Not enough data
Monitoring
Not enough data
Not enough data
8.9
6
Not enough data
10.0
5
Not enough data
Reporting
Not enough data
Not enough data
9.4
6
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.7
85
Administration
Not enough data
9.3
62
Not enough data
8.4
51
Not enough data
9.8
75
Not enough data
8.1
53
Not enough data
8.6
60
Functionality
Not enough data
9.3
53
Not enough data
9.0
54
Not enough data
9.0
26
Not enough data
8.7
50
Analysis
Not enough data
8.1
19
Not enough data
7.8
26
Not enough data
8.5
52
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.8
16
Platform Features
Not enough data
9.5
16
Not enough data
8.9
14
Not enough data
9.6
16
Not enough data
8.8
14
Not enough data
9.1
15
Not enough data
7.7
14
Not enough data
Not enough data
Automation Capabilities
Not enough data
8.3
14
Not enough data
8.2
14
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Not enough data
8.9
11
Identity and Access Management - Zero Trust Platforms
Not enough data
7.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
5
Reporting and Policies - Zero Trust Platforms
Not enough data
9.0
5
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Email Anti-spam Features
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Application ManagementHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Agentic AI - Mobile Application Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
Encryption
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.1
9
Not enough data
Administration
9.2
6
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
6
Not enough data
Not enough data
Not enough data
Platform
Not enough data
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
9.1
9
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Heimdal
Heimdal
ThreatLocker Platform
ThreatLocker Platform
Heimdal and ThreatLocker Platform are categorized as Managed Detection and Response (MDR) and Endpoint Detection & Response (EDR)
Reviews
Reviewers' Company Size
Heimdal
Heimdal
Small-Business(50 or fewer emp.)
27.7%
Mid-Market(51-1000 emp.)
59.6%
Enterprise(> 1000 emp.)
12.8%
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
53.7%
Mid-Market(51-1000 emp.)
33.0%
Enterprise(> 1000 emp.)
13.3%
Reviewers' Industry
Heimdal
Heimdal
Computer & Network Security
10.6%
Construction
8.5%
Hospital & Health Care
6.4%
Oil & Energy
6.4%
Government Administration
4.3%
Other
63.8%
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
34.5%
Computer & Network Security
18.5%
Hospital & Health Care
4.2%
Financial Services
3.6%
Accounting
2.7%
Other
36.4%
Alternatives
Heimdal
Heimdal Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
NinjaOne
NinjaOne
Add NinjaOne
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Huntress Managed EDR
Huntress Managed EDR
Add Huntress Managed EDR
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Discussions
Heimdal
Heimdal Discussions
Monty the Mongoose crying
Heimdal has no discussions with answers
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more