Try our new research platform with insights from 80,000+ expert users

Blackpoint Cyber MDR vs ThreatLocker Cyber Hero MDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 23, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Blackpoint Cyber MDR
Ranking in Managed Detection and Response (MDR)
11th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
5
Ranking in other categories
No ranking in other categories
ThreatLocker Cyber Hero MDR
Ranking in Managed Detection and Response (MDR)
12th
Average Rating
9.2
Reviews Sentiment
8.8
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Managed Detection and Response (MDR) category, the mindshare of Blackpoint Cyber MDR is 4.1%, down from 6.0% compared to the previous year. The mindshare of ThreatLocker Cyber Hero MDR is 0.5%. It is calculated based on PeerSpot user engagement data.
Managed Detection and Response (MDR)
 

Featured Reviews

Gary Herbstman - PeerSpot reviewer
Experienced reduced alert fatigue with streamlined notifications
We use Blackpoint Cyber MDR for our higher-end clients who need a higher level of control over security I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real. This feature ensures that I am notified only…
AP
Enables granular control through Ringfencing and works seamlessly for us as an MSP
The most valuable feature is ringfencing. It enables us to only allow what needs to be allowed into the environment and keep out anything else. It permits applications to perform without accessing anything they are not supposed to. For instance, if an application tries to utilize the command prompt unnecessarily, it blocks this action while still allowing users to operate the application. Being able to let the user or the customer continue to use that application but block the application from using the command prompt because it is not necessary is great. Being able to inform customers about enhanced security from a zero-trust standpoint has significantly improved our sales. We are able to walk up to a customer or call a new prospect and let them know that we are going to keep them secure at a level that they have not seen before. We are able to explain to them how cybersecurity works through it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"On a scale from one to ten, I would rate the overall solution as a ten."
"The solution also watches over Microsoft 365 and keeps a copy of logs."
"The solution is all encompassing and can incorporate email monitoring."
"On my end, the most valuable feature of this solution is that I can install it and forget about it. After that, their SOC team takes over and they only call me when there's a problem."
"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"Their SOC is phenomenal in not monitoring and responding and taking action."
"The most valuable feature, in terms of protection, is the allowlist, which ensures that only IT-approved applications run."
"It's secure, and we know it's secure."
"The ability to isolate the device when something is happening and the network access control element are valuable features."
"ThreatLocker is worth every penny and a couple more."
"There is a tremendous amount that is helpful, such as their recording, watching the systems, locking down the systems, and their training."
"I did a detailed search for two years, and ThreatLocker Zero Trust is the only one that does what it says it can do."
"The customer service is really good."
"The most valuable feature is ringfencing. It enables us to only allow what needs to be allowed into the environment and keep out anything else. It permits applications to perform without accessing anything they are not supposed to."
 

Cons

"The solution does not tie into other EDR products like CyberArk or CrowdStrike but that might be more useful."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"Some texts seem to report items as normal too quickly."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"The feature we keep asking for is a vulnerability scan."
"The interface could be more intuitive. More transparency is needed in the interface as a lot of details are hidden behind the scenes, making them difficult or impossible to access."
"The interface could be more intuitive."
"As far as an improvement regarding ThreatLocker Cyber Hero MDR, there are still some things that, out of the box, it would be nice to have a more fine-grained ability to create certain exclusions."
"Pricing is a bit high, with a minimum of 50 devices. Lowering that for small companies would be great."
"We have not used it for long enough, but there are some things users have asked for, such as integration with other platforms for reporting. They want a single glass location to use all the tools."
"The Cyber Hero Support is not as effective as it is portrayed. There is a lot of miscommunication in notes, which are very buried and not easy to find."
"The ultimate, most amazing solution in the market could be less pricey and more transparent."
"From an MDR perspective, the solution can have the ability to ingest logs from other sources, such as M365, firewalls, external sources, and even cloud SaaS-based platforms. This way, we can obtain a holistic picture."
"From an MDR perspective, the solution can have the ability to ingest logs from other sources, such as M365, firewalls, external sources, and even cloud SaaS-based platforms. This way, we can obtain a holistic picture."
"Pricing is a bit high, with a minimum of 50 devices. Lowering that for small companies would be great."
 

Pricing and Cost Advice

"The pricing is in line with other products."
"The pricing is reasonable."
"The pricing is not so bad. My clients do not like it, but they are following our pricing."
"It has been excellent."
"It is pretty good. We would have been one of the biggest partners in Ireland, so we got pretty good pricing at the start, and it is still competitive. Pricing depends on what we are up against."
"ThreatLocker is worth every penny and a couple more."
report
Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Manufacturing Company
8%
Retailer
7%
Healthcare Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Blackpoint Cyber MDR?
While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement.
What is your primary use case for Blackpoint Cyber MDR?
The solution serves as a baseline security offering. We have implemented it for every client that we do business with.
What needs improvement with ThreatLocker Cyber Hero MDR?
We have not used it for long enough, but there are some things users have asked for, such as integration with other platforms for reporting. They want a single glass location to use all the tools. ...
What is your primary use case for ThreatLocker Cyber Hero MDR?
We deployed it to every single one of our new customers and moved all our customers into the MDR and EDR platform, ThreatLocker Cyber Hero, about eight months ago.
 

Also Known As

Blackpoint Cyber Managed Detection + Response, Blackpoint Cyber Managed Detection and Response
No data available
 

Overview

 

Sample Customers

CoreRecon, Peerless Tech Solutions, Lorien Health
Information Not Available
Find out what your peers are saying about Blackpoint Cyber MDR vs. ThreatLocker Cyber Hero MDR and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.