Introducing G2.ai, the future of software buying.Try now

Compare Tanium Platform and ThreatLocker Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Tanium Platform
Tanium Platform
Star Rating
(17)4.3 out of 5
Market Segments
Enterprise (46.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Tanium Platform
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(294)4.8 out of 5
Market Segments
Small-Business (61.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Tanium Platform excels in compliance management with a score of 9.6, making it a strong choice for enterprises needing to adhere to strict regulations. In contrast, ThreatLocker, while effective, does not provide a specific compliance score, which may be a consideration for businesses focused on regulatory requirements.
  • Reviewers mention that ThreatLocker shines in ease of setup with a score of 8.8, significantly higher than Tanium's 6.3. This suggests that users find ThreatLocker more user-friendly and quicker to implement, which can be crucial for small businesses looking to minimize downtime.
  • G2 users highlight the quality of support for ThreatLocker, scoring an impressive 9.8, compared to Tanium's 8.8. This indicates that users feel more supported and satisfied with ThreatLocker's customer service, which can be a deciding factor for companies needing reliable assistance.
  • Users on G2 report that Tanium Platform offers robust application control features, scoring 9.7, which is essential for enterprises managing numerous applications. ThreatLocker also provides application control but does not specify a score, potentially indicating less emphasis on this feature.
  • Reviewers mention that Tanium's proactive threat hunting capabilities, with a score of 9.2, are a standout feature, allowing organizations to stay ahead of potential threats. In comparison, ThreatLocker does not highlight this feature as prominently, which may affect its appeal to security-focused enterprises.
  • Users say that both platforms provide automated remediation capabilities, but Tanium's score of 9.0 is on par with ThreatLocker's, indicating that both solutions are effective in this area. However, Tanium's additional focus on incident reporting (8.0) may provide more comprehensive insights for users looking to analyze security incidents.
Pricing
Entry-Level Pricing
Tanium Platform
No pricing available
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
Tanium Platform
No trial information available
ThreatLocker Platform
Free Trial is available
Ratings
Meets Requirements
8.9
14
9.6
140
Ease of Use
7.7
14
8.3
246
Ease of Setup
7.3
10
8.5
234
Ease of Admin
7.2
9
8.6
134
Quality of Support
8.3
13
9.8
139
Has the product been a good partner in doing business?
8.1
9
9.7
132
Product Direction (% positive)
10.0
14
9.7
133
Features by Category
Not enough data
7.5
7
Network Management
Not enough data
Feature Not Available
Not enough data
3.8
7
Not enough data
8.1
7
Not enough data
6.9
6
Security
Not enough data
8.3
7
Not enough data
8.1
7
Not enough data
7.8
6
Not enough data
8.1
7
Identity Management
Not enough data
8.6
7
Not enough data
7.1
7
Not enough data
8.3
7
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.7
58
Administration
Not enough data
9.2
55
Not enough data
8.4
49
Not enough data
9.7
55
Not enough data
8.1
52
Not enough data
8.5
56
Functionality
Not enough data
9.3
52
Not enough data
8.9
49
Not enough data
9.0
24
Not enough data
8.8
47
Analysis
Not enough data
8.1
18
Not enough data
7.8
23
Not enough data
8.5
51
Not enough data
Not enough data
Asset Inventory
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - IT Asset Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.8
15
Platform Features
Not enough data
9.4
15
Not enough data
8.9
14
Not enough data
9.6
15
Not enough data
8.8
14
Not enough data
9.1
15
Not enough data
7.7
14
Not enough data
Not enough data
Automation Capabilities
Not enough data
8.3
14
Not enough data
8.2
14
Not enough data
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Generative AI - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Management - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Records
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Tanium Platform
Tanium Platform
ThreatLocker Platform
ThreatLocker Platform
Tanium Platform and ThreatLocker Platform share no categories
Reviews
Reviewers' Company Size
Tanium Platform
Tanium Platform
Small-Business(50 or fewer emp.)
13.3%
Mid-Market(51-1000 emp.)
40.0%
Enterprise(> 1000 emp.)
46.7%
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
61.8%
Mid-Market(51-1000 emp.)
31.7%
Enterprise(> 1000 emp.)
6.5%
Reviewers' Industry
Tanium Platform
Tanium Platform
Information Technology and Services
43.8%
Computer & Network Security
12.5%
Transportation/Trucking/Railroad
6.3%
Security and Investigations
6.3%
Pharmaceuticals
6.3%
Other
25.0%
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
37.5%
Computer & Network Security
19.1%
Hospital & Health Care
4.1%
Accounting
3.1%
Government Administration
2.7%
Other
33.4%
Alternatives
Tanium Platform
Tanium Platform Alternatives
N-able N-central
N-able N-central
Add N-able N-central
NinjaOne
NinjaOne
Add NinjaOne
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Discussions
Tanium Platform
Tanium Platform Discussions
Monty the Mongoose crying
Tanium Platform has no discussions with answers
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more