ThreatLocker Platform Features
Network Management (2)
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security (4)
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Administration (5)
Compliance
This feature was mentioned in 62 ThreatLocker Platform reviews.
Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
This feature was mentioned in 51 ThreatLocker Platform reviews.
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Application Control
75 reviewers of ThreatLocker Platform have provided feedback on this feature.
Blocks endpoint users from accessing restricted applications.
Asset Management
53 reviewers of ThreatLocker Platform have provided feedback on this feature.
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
Based on 60 ThreatLocker Platform reviews.
Manages user network accessibility on laptops and mobile devices.
Functionality (4)
System Isolation
Based on 53 ThreatLocker Platform reviews.
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Firewall
Based on 54 ThreatLocker Platform reviews.
Protects endpoint devices from a variety of attacks and malware threats.
Endpoint Intelligence
As reported in 26 ThreatLocker Platform reviews.
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Based on 50 ThreatLocker Platform reviews.
Provides multiple techniques and information sources to alert users of malware occurrences.
Analysis (3)
Automated Remediation
19 reviewers of ThreatLocker Platform have provided feedback on this feature.
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reports
26 reviewers of ThreatLocker Platform have provided feedback on this feature.
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Behavioral Analysis
Based on 52 ThreatLocker Platform reviews.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Platform Features (7)
24/7 support
16 reviewers of ThreatLocker Platform have provided feedback on this feature.
Provides 24/7 support to customers with technical questions.
Proactive report alerts
This feature was mentioned in 14 ThreatLocker Platform reviews.
Proactively sends reports or alerts to customers.
Application control
Based on 16 ThreatLocker Platform reviews.
Lets users detect and block applications that are not a security threat.
Proactive threat hunting
14 reviewers of ThreatLocker Platform have provided feedback on this feature.
Proactively hunts threats.
Rapid response time
As reported in 15 ThreatLocker Platform reviews.
Provides rapid reponse time to cyber threats.
Customizeable reports
Based on 14 ThreatLocker Platform reviews.
Provides the ability to customize reports.
Managed Services
Offers MDR as a service.
Automation Capabilities (3)
Automated remediation
Based on 14 ThreatLocker Platform reviews.
Ability to automatically neutralize or eliminate active vulnerabilities.
Automated investigation
Based on 14 ThreatLocker Platform reviews.
Ability to automatically investigate networks and endpoints for threats.
AI Agents
Utilizes AI agents for detection and response tasks.
Identity and Access Management - Zero Trust Platforms (4)
Single sign-on (SSO)
Simplifies user authentication across multiple services while maintaining security.
Multi-factor authentication (MFA)
Ensures that users are verified through multiple credentials before access is granted, reducing the risk of compromised accounts.
Role-based access control (RBAC)
Grants access based on the user’s role within the organization, adhering to the principle of least privilege.
Identity federation
Integrates with external identity providers to manage user identities across different platforms and services.
Security - Zero Trust Platforms (5)
Encryption
Mandatory encryption of data both at rest and in transit protects against unauthorized access.
Endpoint detection and response (EDR)
Continuous monitoring and real-time response capabilities with EDR help detect and mitigate threats on endpoint devices.
Device posture assessment
Verifies the security status of a device before granting access to network resources, ensuring that only compliant devices can connect.
Micro-segmentation
Divides the network into isolated segments to prevent lateral movement by attackers, ensuring that if one segment is compromised, others remain secure.
Zero trust network access (ZTNA)
Replaces traditional VPNs by enforcing granular, context-aware access to applications based on user identity, device, and other factors.
Data Security - Zero Trust Platforms (2)
Data loss prevention (DLP)
Detect and prevent unauthorized access or transfer of sensitive data.
Data classification
Data classification automatically categorizes data based on its sensitivity, allowing for appropriate security measures to be applied
Application Visibility - Zero Trust Platforms (5)
API support
API support ensures that the zero trust platform can integrate seamlessly with other security tools and existing infrastructure
Application-level controls
Provides the ability to enforce security policies at the application layer, ensuring that access to specific applications is tightly controlled.
Secure application access
ensures that only authorized users can access critical applications, protecting against unauthorized entry points
User and entity behavior analytics (UEBA)
UEBA identifies unusual behavior that may indicate a security threat, enabling proactive threat managemen
Continuous monitoring
Provides real-time visibility into all network traffic, user activities, and data flows to detect anomalies
Reporting and Policies - Zero Trust Platforms (5)
Policy automation
allows for automatic application of security policies based on predefined criteria, reducing the risk of human error and ensuring consistent enforcement
Regulatory compliance
Regulatory compliance assists organizations in adhering to industry-specific regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA)
Cross-platform compatibility
This works across different environments, including on-premises, cloud, and hybrid setups, ensuring comprehensive security coverage
Policy enforcement
This ensures that security policies are consistently applied across all users, devices, and application
Comprehensive reporting
Detailed reports that provide insights into security events help organizations maintain compliance and optimize their security posture
Agentic AI - Zero Trust Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Services - Endpoint Detection & Response (EDR) (1)
Managed Services
Offers managed detection and response services.





