Compare ThreatLocker Platform and Wazuh - The Open Source Security Platform

At a Glance
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(473)4.8 out of 5
Market Segments
Small-Business (53.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Star Rating
(65)4.5 out of 5
Market Segments
Small-Business (49.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Wazuh - The Open Source Security Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that the ThreatLocker Platform excels in user satisfaction, with a significantly higher overall rating compared to Wazuh. Users appreciate its intuitive interface and effective Zero-Trust enforcement, which helps protect against unknown threats without relying on traditional antivirus signatures.
  • According to verified reviews, the ThreatLocker Platform offers a smoother implementation process, with users highlighting its easy onboarding experience. In contrast, while Wazuh is praised for its open-source flexibility, some users find the setup process to be more complex, especially for those unfamiliar with security configurations.
  • Users say that the ThreatLocker Platform provides exceptional support, with a high quality of assistance reported by many. This is a stark contrast to Wazuh, where users have noted that support can be less responsive, which may be a consideration for businesses that require immediate help.
  • Reviewers mention that the application control feature of the ThreatLocker Platform is particularly beneficial, allowing users to monitor and manage application behavior effectively. Wazuh, while offering strong visibility and control over security events, may not provide the same level of detailed application management.
  • Users highlight that the ThreatLocker Platform is particularly well-suited for small businesses, with over half of its reviews coming from this segment. Wazuh also caters to small businesses but has a slightly lower percentage, indicating that ThreatLocker may resonate more with this audience.
  • According to recent feedback, Wazuh is appreciated for its cost-effectiveness as a free, open-source solution, making it an attractive option for budget-conscious users. However, some users feel that the trade-off in support and ease of use may not justify the lack of investment compared to the more robust offerings of the ThreatLocker Platform.
Pricing
Entry-Level Pricing
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Wazuh - The Open Source Security Platform
No pricing available
Free Trial
ThreatLocker Platform
Free Trial is available
Wazuh - The Open Source Security Platform
No trial information available
Ratings
Meets Requirements
9.5
146
8.8
48
Ease of Use
8.3
284
8.6
48
Ease of Setup
8.5
270
8.0
29
Ease of Admin
8.6
138
8.6
28
Quality of Support
9.7
145
8.2
46
Has the product been a good partner in doing business?
9.7
136
8.5
23
Product Direction (% positive)
9.7
139
9.0
46
Features by Category
7.9
8
Not enough data
Network Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.1
7
Not enough data
6.9
6
Not enough data
Security
8.5
8
Not enough data
8.1
7
Not enough data
7.8
6
Not enough data
8.1
7
Not enough data
Identity Management
8.6
7
Not enough data
7.1
7
Not enough data
8.3
7
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.7
85
Not enough data
Administration
9.3
62
Not enough data
8.4
51
Not enough data
9.8
75
Not enough data
8.1
53
Not enough data
8.6
60
Not enough data
Functionality
9.3
53
Not enough data
9.0
54
Not enough data
9.0
26
Not enough data
8.7
50
Not enough data
Analysis
8.1
19
Not enough data
7.8
26
Not enough data
8.5
52
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
8.8
16
Not enough data
Platform Features
9.5
16
Not enough data
8.9
14
Not enough data
9.6
16
Not enough data
8.8
14
Not enough data
9.1
15
Not enough data
7.7
14
Not enough data
Not enough data
Not enough data
Automation Capabilities
8.3
14
Not enough data
8.2
14
Not enough data
Not enough data
Not enough data
8.9
11
Not enough data
Identity and Access Management - Zero Trust Platforms
7.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
Reporting and Policies - Zero Trust Platforms
9.0
5
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
8.0
27
Response
Not enough data
7.9
24
Not enough data
7.9
23
Not enough data
7.8
22
Not enough data
8.5
25
Records
Not enough data
9.1
25
Not enough data
8.2
25
Not enough data
7.9
22
Management
Not enough data
8.8
24
Not enough data
7.9
21
Not enough data
7.9
21
Generative AI
Not enough data
7.0
10
Not enough data
6.7
10
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
ThreatLocker Platform
ThreatLocker Platform
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
ThreatLocker Platform and Wazuh - The Open Source Security Platform are categorized as Endpoint Detection & Response (EDR)
Unique Categories
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform is categorized as Incident Response
Reviews
Reviewers' Company Size
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
53.7%
Mid-Market(51-1000 emp.)
33.0%
Enterprise(> 1000 emp.)
13.3%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Small-Business(50 or fewer emp.)
49.2%
Mid-Market(51-1000 emp.)
36.5%
Enterprise(> 1000 emp.)
14.3%
Reviewers' Industry
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
34.5%
Computer & Network Security
18.5%
Hospital & Health Care
4.2%
Financial Services
3.6%
Accounting
2.7%
Other
36.4%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Information Technology and Services
38.1%
Computer & Network Security
19.0%
Computer Software
11.1%
Security and Investigations
4.8%
Hospital & Health Care
4.8%
Other
22.2%
Alternatives
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Datadog
Datadog
Add Datadog
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
CrowdSec
CrowdSec
Add CrowdSec
Discussions
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Discussions
What is Wazuh - The Open Source Security Platform used for?
1 Comment
Nikhil D.
ND
We use wazuh in Amazon AWS to monitor virtual machines and cloud instances. Apart from it it can be used for endpoint security, we just need to install an...Read more
Monty the Mongoose crying
Wazuh - The Open Source Security Platform has no more discussions with answers