Introducing G2.ai, the future of software buying.Try now

Compare LastPass and ThreatDown

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
LastPass
LastPass
Star Rating
(1,942)4.4 out of 5
Market Segments
Small-Business (63.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$7.00 1 User/Per Month, Billed Annually
Free Trial is available
Browse all 3 pricing plans
ThreatDown
ThreatDown
Star Rating
(1,069)4.6 out of 5
Market Segments
Small-Business (47.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial 1 Device Per Year
Free Trial is available
Browse all 3 pricing plans

LastPass vs ThreatDown

When assessing the two solutions, reviewers found ThreatDown easier to use, set up, and administer. Reviewers also preferred doing business with ThreatDown overall.

  • LastPass and ThreatDown both meet the requirements of our reviewers at a comparable rate.
  • When comparing quality of ongoing product support, reviewers felt that ThreatDown is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of ThreatDown over LastPass.
Pricing
Entry-Level Pricing
LastPass
LastPass Business
$7.00
1 User/Per Month, Billed Annually
Browse all 3 pricing plans
ThreatDown
Endpoint Protection - 14 Day Trial
Free Trial
1 Device Per Year
Browse all 3 pricing plans
Free Trial
LastPass
Free Trial is available
ThreatDown
Free Trial is available
Ratings
Meets Requirements
9.2
1,643
9.2
959
Ease of Use
8.7
1,672
9.3
966
Ease of Setup
8.7
775
9.2
728
Ease of Admin
8.4
539
9.1
696
Quality of Support
8.2
1,000
8.8
856
Has the product been a good partner in doing business?
8.6
483
9.1
675
Product Direction (% positive)
8.0
1,615
8.9
951
Features by Category
8.7
166
Not enough data
Authentication Options
8.8
147
Not enough data
8.5
139
Not enough data
8.9
133
Not enough data
8.7
126
Not enough data
8.4
103
Not enough data
8.4
99
Not enough data
Access Control Types
Feature Not Available
Not enough data
8.8
129
Not enough data
9.0
125
Not enough data
8.6
105
Not enough data
8.8
109
Not enough data
Administration
8.7
114
Not enough data
8.9
126
Not enough data
8.7
124
Not enough data
8.7
119
Not enough data
9.0
124
Not enough data
Platform
9.0
124
Not enough data
8.9
115
Not enough data
9.0
125
Not enough data
8.6
102
Not enough data
8.4
109
Not enough data
8.4
106
Not enough data
8.2
98
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.0
259
Not enough data
Authentication type
8.0
210
|
Verified
Not enough data
6.5
176
Not enough data
7.9
202
Not enough data
7.3
178
|
Verified
Not enough data
8.1
199
|
Verified
Not enough data
8.3
201
|
Verified
Not enough data
8.6
210
Not enough data
7.8
180
|
Verified
Not enough data
Functionality
9.1
232
|
Verified
Not enough data
8.6
215
|
Verified
Not enough data
Implementation
9.0
245
|
Verified
Not enough data
7.2
164
Not enough data
7.3
165
Not enough data
Biometric AuthenticationHide 7 FeaturesShow 7 Features
8.0
98
Not enough data
Integration
8.3
69
Not enough data
7.2
68
Not enough data
7.4
66
Not enough data
7.5
65
Not enough data
Administration
9.0
81
Not enough data
8.2
69
Not enough data
8.3
70
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
9.1
15
Not enough data
Administration
9.3
10
Not enough data
9.0
12
Not enough data
8.9
12
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.9
286
Administration
Not enough data
9.1
229
Not enough data
8.8
236
Not enough data
8.9
220
Not enough data
8.5
203
Not enough data
8.8
222
Functionality
Not enough data
8.9
212
Not enough data
8.9
213
Not enough data
9.0
245
Not enough data
9.5
259
Analysis
Not enough data
9.0
233
Not enough data
8.9
238
Not enough data
8.9
221
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
8.1
147
Not enough data
Functionality
7.7
99
Not enough data
7.8
105
Not enough data
8.8
132
Not enough data
8.0
105
Not enough data
8.4
80
Not enough data
Functionality
8.6
69
Not enough data
8.9
77
Not enough data
8.6
66
Not enough data
7.2
49
Not enough data
8.5
64
Not enough data
7.7
56
Not enough data
8.9
71
Not enough data
8.6
67
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.7
124
Platform Features
Not enough data
9.1
121
Not enough data
9.2
120
Not enough data
8.9
117
Not enough data
9.1
120
Not enough data
9.3
121
Not enough data
8.6
119
Not enough data
9.3
7
Automation Capabilities
Not enough data
9.1
119
Not enough data
9.1
120
Not enough data
5.3
5
Not enough data
6.9
170
Generative AI
Not enough data
6.8
169
Not enough data
6.9
155
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
7.4
115
Generative AI
Not enough data
7.4
115
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.7
13
Services - Endpoint Detection & Response (EDR)
Not enough data
9.7
13
8.7
1,251
Not enough data
Usability & Access
9.0
1198
Not enough data
8.9
1198
Not enough data
8.5
1097
Not enough data
9.0
1141
Not enough data
8.4
1033
Not enough data
Security Measures
9.3
1172
Not enough data
8.9
1033
Not enough data
8.5
874
Not enough data
Storage
8.3
841
Not enough data
7.7
770
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
LastPass
LastPass
Small-Business(50 or fewer emp.)
63.7%
Mid-Market(51-1000 emp.)
25.1%
Enterprise(> 1000 emp.)
11.2%
ThreatDown
ThreatDown
Small-Business(50 or fewer emp.)
47.2%
Mid-Market(51-1000 emp.)
40.9%
Enterprise(> 1000 emp.)
11.9%
Reviewers' Industry
LastPass
LastPass
Information Technology and Services
11.2%
Computer Software
8.4%
Marketing and Advertising
7.6%
Financial Services
4.2%
Internet
3.7%
Other
64.9%
ThreatDown
ThreatDown
Information Technology and Services
12.7%
Computer & Network Security
6.8%
Construction
4.6%
Computer Software
4.4%
Education Management
4.0%
Other
67.4%
Alternatives
LastPass
LastPass Alternatives
1Password
1Password
Add 1Password
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
LogMeOnce
LogMeOnce
Add LogMeOnce
NordPass Business
NordPass Business
Add NordPass Business
ThreatDown
ThreatDown Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Discussions
LastPass
LastPass Discussions
How do I migrate an employee's account from her personal email to her corporate email?
5 Comments
GC
Export from the personal account and import to the corporate account. Or create the corporate account, let the user link both accounts and migrate the...Read more
What is LastPass used for?
3 Comments
Will C.
WC
Lastpass is a password management system.Read more
What is LastPass used for?
3 Comments
Gloria O.
GO
LastPass is used to save your login information to accounts and memberships that require a password to access. You can also organized your logins, such as:...Read more
ThreatDown
ThreatDown Discussions
Is Malwarebytes enough for your computer to be 100% secure?
5 Comments
Surabhi P.
SP
Malware bytes Premium & End-Point Protection provides Protection from Viruses, Malware, Ransomware-type of malware, Adware,Spyware,Trojans, PUPs, PUMs,...Read more
What is malwarebytes tray application?
4 Comments
Nicolas G.
NG
You don't need any anti-virus/malware protection on your mac if it isn't too old? Read more
Using Malwarebytes EDR in a midsize company needs extra investment for web filter?
4 Comments
RH
The MB web detections works great against malware, but maybe for the midsize companies, instead for a perimeter investment besides the firewall, the MB can...Read more
LastPass
LastPass
Optimized for quick response
ThreatDown
ThreatDown
Optimized for quick response