Compare N-able N-central and ThreatLocker Platform

At a Glance
N-able N-central
N-able N-central
Star Rating
(530)4.4 out of 5
Market Segments
Small-Business (61.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about N-able N-central
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(473)4.8 out of 5
Market Segments
Small-Business (53.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that ThreatLocker Platform excels in user satisfaction, boasting a higher overall rating compared to N-able N-central. Users appreciate its application control feature, which allows IT teams to easily manage user activities and maintain security by ensuring that only approved applications can run.
  • According to verified reviews, N-able N-central is praised for its powerful rule deployment capabilities, enabling users to manage customer environments effectively. However, some users mention that it can be challenging to configure to meet specific workflow needs, which may hinder its overall usability.
  • Users say that ThreatLocker Platform offers a clean and intuitive interface, making it fast and easy to deploy via RMM tools. This ease of use is a significant advantage for teams looking to implement security measures quickly, while N-able N-central's interface is noted to be more complex, potentially requiring more time to navigate.
  • Reviewers mention that the quality of support for ThreatLocker Platform is exceptional, with a high satisfaction score reflecting its responsiveness and helpfulness. In contrast, while N-able N-central provides decent support, users feel that it does not quite match the level of assistance offered by ThreatLocker.
  • According to recent user feedback, N-able N-central's portal is rich in information, which can be a tremendous time saver during critical transitions, such as the recent cloud shift. However, some users feel that the overwhelming amount of information can be daunting, making it less user-friendly compared to ThreatLocker's streamlined approach.
  • G2 reviewers highlight that ThreatLocker Platform's unified auditing function is particularly beneficial for troubleshooting and tracking application history, which enhances security oversight. N-able N-central, while effective in managing customer environments, lacks this level of detailed auditing, which may limit its effectiveness in certain scenarios.
Pricing
Entry-Level Pricing
N-able N-central
No pricing available
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
N-able N-central
Free Trial is available
ThreatLocker Platform
Free Trial is available
Ratings
Meets Requirements
8.4
432
9.5
146
Ease of Use
7.9
442
8.3
284
Ease of Setup
7.7
374
8.5
270
Ease of Admin
7.9
368
8.6
138
Quality of Support
8.0
410
9.7
145
Has the product been a good partner in doing business?
8.6
353
9.7
136
Product Direction (% positive)
8.8
426
9.7
139
Features by Category
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
8.1
288
Not enough data
Inventory Management - Remote Monitoring & Management (RMM)
8.7
283
|
Verified
Not enough data
9.5
10
Not enough data
8.7
9
Not enough data
Monitoring and Management
9.0
281
|
Verified
Not enough data
7.9
157
Not enough data
7.6
278
|
Verified
Not enough data
8.2
281
|
Verified
Not enough data
9.0
10
Not enough data
IT Operations & Workflow - Remote Monitoring & Management (RMM)
8.7
9
Not enough data
Service Management
8.6
281
|
Verified
Not enough data
9.1
9
Not enough data
7.9
8
Not enough data
Agentic AI - Remote Monitoring & Management (RMM)
7.2
12
Not enough data
7.4
12
Not enough data
7.9
13
Not enough data
6.8
12
Not enough data
7.4
12
Not enough data
7.1
12
Not enough data
6.8
12
Not enough data
Not enough data
7.9
8
Network Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.1
7
Not enough data
6.9
6
Security
Not enough data
8.5
8
Not enough data
8.1
7
Not enough data
7.8
6
Not enough data
8.1
7
Identity Management
Not enough data
8.6
7
Not enough data
7.1
7
Not enough data
8.3
7
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
Not enough data
Not enough data
Scope
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.6
136
Not enough data
Functionality
8.4
135
Not enough data
8.7
136
Not enough data
Feature Not Available
Not enough data
8.2
132
Not enough data
Monitoring - Network Monitoring
7.6
12
Not enough data
7.8
12
Not enough data
8.2
12
Not enough data
Management
7.8
131
Not enough data
7.7
131
Not enough data
7.2
129
Not enough data
Analytics - Network Monitoring
7.1
11
Not enough data
6.8
12
Not enough data
Security - Network Monitoring
7.6
12
Not enough data
7.9
12
Not enough data
7.8
12
Not enough data
Network Performance - Network Monitoring
7.2
12
Not enough data
8.8
12
Not enough data
AI Automation - Network Monitoring
6.3
12
Not enough data
7.4
12
Not enough data
6.2
11
Not enough data
Agentic AI - Network Monitoring
6.1
6
Not enough data
8.3
7
Not enough data
8.6
7
Not enough data
6.9
7
Not enough data
6.7
7
Not enough data
6.0
7
Not enough data
7.1
7
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.7
85
Administration
Not enough data
9.3
62
Not enough data
8.4
51
Not enough data
9.8
75
Not enough data
8.1
53
Not enough data
8.6
60
Functionality
Not enough data
9.3
53
Not enough data
9.0
54
Not enough data
9.0
26
Not enough data
8.7
50
Analysis
Not enough data
8.1
19
Not enough data
7.8
26
Not enough data
8.5
52
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.8
16
Platform Features
Not enough data
9.5
16
Not enough data
8.9
14
Not enough data
9.6
16
Not enough data
8.8
14
Not enough data
9.1
15
Not enough data
7.7
14
Not enough data
Not enough data
Automation Capabilities
Not enough data
8.3
14
Not enough data
8.2
14
Not enough data
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
5.9
128
Not enough data
Generative AI
5.9
128
Not enough data
Not enough data
8.9
11
Identity and Access Management - Zero Trust Platforms
Not enough data
7.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
5
Reporting and Policies - Zero Trust Platforms
Not enough data
9.0
5
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.0
5
Not enough data
Services - Endpoint Detection & Response (EDR)
9.0
5
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise IT ManagementHide 18 FeaturesShow 18 Features
7.8
158
Not enough data
Analysis
7.4
154
Not enough data
Platform
6.8
154
Not enough data
8.9
158
Not enough data
7.6
148
Not enough data
7.9
154
Not enough data
7.4
150
Not enough data
Security
8.1
152
Not enough data
8.5
156
Not enough data
7.2
148
Not enough data
8.0
151
Not enough data
7.4
148
Not enough data
Agentic AI - Enterprise IT Management
8.1
6
Not enough data
8.3
6
Not enough data
8.3
6
Not enough data
7.8
6
Not enough data
7.5
6
Not enough data
7.5
6
Not enough data
7.5
6
Not enough data
Categories
Categories
Shared Categories
N-able N-central
N-able N-central
ThreatLocker Platform
ThreatLocker Platform
N-able N-central and ThreatLocker Platform are categorized as Endpoint Detection & Response (EDR)
Reviews
Reviewers' Company Size
N-able N-central
N-able N-central
Small-Business(50 or fewer emp.)
61.1%
Mid-Market(51-1000 emp.)
34.0%
Enterprise(> 1000 emp.)
4.9%
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
53.7%
Mid-Market(51-1000 emp.)
33.0%
Enterprise(> 1000 emp.)
13.3%
Reviewers' Industry
N-able N-central
N-able N-central
Information Technology and Services
48.1%
Computer & Network Security
21.6%
Computer Networking
4.5%
Accounting
1.6%
Information Services
1.6%
Other
22.6%
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
34.5%
Computer & Network Security
18.5%
Hospital & Health Care
4.2%
Financial Services
3.6%
Accounting
2.7%
Other
36.4%
Alternatives
N-able N-central
N-able N-central Alternatives
NinjaOne
NinjaOne
Add NinjaOne
Atera
Atera
Add Atera
Datto RMM
Datto RMM
Add Datto RMM
Kaseya VSA
Kaseya VSA
Add Kaseya VSA
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Discussions
N-able N-central
N-able N-central Discussions
Why is there no "Server Down" alarm or monitoring notificaiton ?
1 Comment
Official Response from N-able N-central
Hi Robert! Hmm - I think our "How to Set up Server Alert to be Sent to a Specific Email Address" might be able to help with your challenge! Check out this...Read more
Integration with more 3rd party AV on the horizon? Such as sophos?
1 Comment
SC
Sup, Nicholas! In short, YUP - we are always looking to expand our product's capabilities by providing best-of-breed integrations with 3rd party vendors. ...Read more
What can I monitor with N-central?
1 Comment
Official Response from N-able N-central
We can monitor just about anything! N-central will automatically detect almost any IP-connected device, and with hundreds of built-in monitoring services.Read more
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more