No more typing reviews! Try our Samantha, our new voice AI agent.

ESET PROTECT Enterprise vs ThreatLocker Zero Trust Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
ESET PROTECT Enterprise offers strong returns with effective security, easy installation, and up to 30% cost savings over CrowdStrike.
Sentiment score
6.5
ThreatLocker Zero Trust Platform reduces costs, boosts IT efficiency, enhances security, and increases revenue through service reselling and protection.
The return on investment is excellent due to its functionality and ease of installation.
Director, Information Technology at Premier Realty Group
There was money saving from using ESET PROTECT Enterprise, which is why I switched from CrowdStrike to ESET.
IT Manager at R K Khanna and Associates
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
Tier 1 IT Engineer at a retailer with 11-50 employees
Based on what we use ThreatLocker Zero Trust Endpoint Protection Platform for with the same functionalities and packaging, it was around 13 or 14 hours.
Head Of Cyber Security at a outsourcing company with 201-500 employees
We have the MDR package as well, and just knowing someone is watching those endpoints at 3:00 a.m. is a lifesaver that you cannot put a dollar figure on.
System Administrator at Gwynedd Mercy University
 

Customer Service

Sentiment score
7.9
Customers praise ESET PROTECT Enterprise's support team for being knowledgeable, responsive, and helpful, often rating them 9 or 10.
Sentiment score
8.0
ThreatLocker Zero Trust Platform offers 24/7 top-tier support with rapid, knowledgeable assistance, direct real agent access, and seamless escalation.
The tech support from ESET is amazing, and I would rate it as ten out of ten.
Owner at Octo-Xpressions
They are very responsive and help in solving issues quickly.
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
Even if support is addressing my problem, if the two issues I mentioned are not resolved, then the support process is not complete.
IT Manager at R K Khanna and Associates
They have been very responsive, helpful, and knowledgeable.
Systems Security Analyst & Deputy Security Officer at a financial services firm with 201-500 employees
I would rate their customer support a ten out of ten.
Director, Managed Services at a consultancy with 11-50 employees
Their support is world-class.
Supervisor, Client Security at a consultancy with 11-50 employees
 

Scalability Issues

Sentiment score
7.5
ESET PROTECT Enterprise is highly scalable, efficiently expanding to thousands of devices, with performance varying across workstations and servers.
Sentiment score
7.8
ThreatLocker Zero Trust Platform is scalable, user-friendly, and efficiently accommodates small to Fortune 500 companies with seamless integration.
It can efficiently scale up to thousands of devices in an organization without issues.
Owner at Octo-Xpressions
I have used many products before, and this solution is definitely scalable.
IT Manager at R K Khanna and Associates
It is better suited for workstations rather than server environments.
Director, Information Technology at Premier Realty Group
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
Technical Engineer at Cloud 1 Solutions
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
Systems Security Analyst & Deputy Security Officer at a financial services firm with 201-500 employees
ThreatLocker Zero Trust Endpoint Protection Platform scales very smoothly with our growing needs.
CEO at Mostro
 

Stability Issues

Sentiment score
7.4
ESET PROTECT Enterprise operates reliably with minimal maintenance, despite occasional update interruptions and manageable false positives.
Sentiment score
7.7
ThreatLocker Zero Trust Platform is praised for stability and support, with minor issues primarily during initial policy tuning.
When it performs an update, ESET PROTECT Enterprise should request permission for restarting because otherwise, users lose their work.
IT Manager at R K Khanna and Associates
The solution is stable, and I have not encountered any glitches.
Owner at Octo-Xpressions
The solution is very, very stable.
Director, Information Technology at Premier Realty Group
For five years, we have not had a problem.
Supervisor, Client Security at a consultancy with 11-50 employees
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
Information Cybersecurity Technology Specialist at Freez.it
It has been very stable, reliable, and accessible.
COO at Panda Technology
 

Room For Improvement

ESET PROTECT Enterprise needs better deployment, performance, automation, UI clarity, and efficient management, especially for mobile and Mac.
Improving identity management, integration, compatibility, UI, network control, and training will enhance ThreatLocker Zero Trust Platform's usability and efficiency.
Sometimes, agents lose connection with the management console, and the administration team needs to reinstall the agents on the computers.
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
They need to reduce the number of notifications on the endpoints.
Director, Information Technology at Premier Realty Group
It takes a lot of processing power when the machine is initially booted.
Owner at Octo-Xpressions
Controlling the cloud environment, not just endpoints, is crucial.
COO at Panda Technology
ThreatLocker Zero Trust Endpoint Protection Platform could improve by being a little more hands-off, perhaps by having a team inside ThreatLocker that does all the vetting of patches; having one person hired by ThreatLocker to check out patches means that a million other industries using ThreatLocker Zero Trust Endpoint Protection Platform do not have to vet the same patch, ultimately saving time and money around the world.
Technical Support Engineer at CMIT Solutions of Central Orlando
This feedback would help us understand what is learned in real-time, especially during a one-hour learning mode setup, ensuring we remain aware of potentially unnecessary learned items.
Server Administrator at Clay County Sheriff's Office
 

Setup Cost

ESET PROTECT Enterprise's pricing is seen as cost-effective, offering good value despite being higher than some competitors.
ThreatLocker Zero Trust Platform offers cost-effective, scalable solutions with flexible pricing and included onboarding, praised for diverse organizational needs.
I pay 40 dollars per agent annually, which is cheaper than 60 dollars per agent for Check Point.
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
We recently paid fourteen dollars and thirty-six cents per unit for 20 users, which is reasonable.
Director, Information Technology at Premier Realty Group
Comparing it to other solutions in the market, it was slightly higher.
IT Manager at R K Khanna and Associates
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
Director, Managed Services at a consultancy with 11-50 employees
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
Supervisor, Client Security at a consultancy with 11-50 employees
Money is saved because it is not costly, and I would suggest it for other companies.
Helpdesk Engineer at Computer Network Infrastructure (CNI) Consultants
 

Valuable Features

ESET PROTECT Enterprise offers robust security with efficient management, minimal resources, and strong threat detection for online transactions.
ThreatLocker Zero Trust Platform enhances security with application control, just-in-time access, and centralized management, simplifying operations efficiently.
It allows simple whitelisting and has a learning mode for new installations, which reduces false positives by adapting to typical user habits.
Director, Information Technology at Premier Realty Group
Its web component prevents infections from malicious websites, which enhances its anti-malware capabilities.
Owner at Octo-Xpressions
One of the strong features of ESET PROTECT Enterprise is its ability to work well on old computers.
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
Cyber Security Specialist at Bremmar Consulting
It protects our customers.
CTO at Zettabytes
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
Tier 1 IT Engineer at a retailer with 11-50 employees
 

Categories and Ranking

ESET PROTECT Enterprise
Average Rating
8.8
Reviews Sentiment
7.0
Number of Reviews
16
Ranking in other categories
Anti-Malware Tools (9th), Extended Detection and Response (XDR) (17th)
ThreatLocker Zero Trust Pla...
Average Rating
9.2
Reviews Sentiment
7.1
Number of Reviews
74
Ranking in other categories
Network Access Control (NAC) (4th), Endpoint Protection Platform (EPP) (6th), Advanced Threat Protection (ATP) (4th), Application Control (1st), ZTNA as a Service (4th), ZTNA (5th), Ransomware Protection (1st)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. ESET PROTECT Enterprise is designed for Anti-Malware Tools and holds a mindshare of 2.1%, up 1.6% compared to last year.
ThreatLocker Zero Trust Platform, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.2% mindshare, up 0.7% since last year.
Anti-Malware Tools Mindshare Distribution
ProductMindshare (%)
ESET PROTECT Enterprise2.1%
Microsoft Defender for Endpoint6.9%
VirusTotal3.0%
Other88.0%
Anti-Malware Tools
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
ThreatLocker Zero Trust Platform1.2%
Microsoft Defender for Endpoint7.2%
CrowdStrike Falcon6.3%
Other85.3%
Endpoint Protection Platform (EPP)
 

Featured Reviews

Manikumar David - PeerSpot reviewer
IT Manager at R K Khanna and Associates
Provides comprehensive monitoring and policy implementation with room for memory optimization
ESET PROTECT Enterprise makes the system a little slow sometimes and updates occur at startup. Sometimes unwanted pop-ups appear to users, and they are unable to disable them. The user-friendliness is lacking in some areas. When users are using any computer, ESET PROTECT Enterprise should work in the background without consuming much memory, and any updates should proceed in the background without disturbing the user.
Santo Joy - PeerSpot reviewer
Head Of Cyber Security at a outsourcing company with 201-500 employees
Security controls have been strengthened with granular application, ringfencing, and access policies
The features of ThreatLocker Zero Trust Endpoint Protection Platform that I like the most are the Ringfencing, elevation control, storage control, and application whitelisting functionality. For examples of how these features benefit my company, we were looking for a solution across various vendors to actually implement application whitelisting controls. ThreatLocker's agent, which is very lightweight and does not use much CPU or RAM, helped us achieve that solution. Ringfencing was an add-on that ticked off a lot of Australian framework security controls, which is the reason we chose it. My impression of the allowlisting feature in terms of managing which software, scripts, and libraries run on my devices is that ThreatLocker's community page has a lot of information around this, which is very helpful. Not only that, the Cyber Hero support that ThreatLocker provides gives us insights and best practices, helping us achieve that solution and guiding us to the right platform. The impact of Ringfencing on controlling the behavior of approved applications has been a big winner for us because it is something that many other platforms do not provide as a functionality. Having that allowed us to identify what applications talk to each other, which is something that many other platforms do not do. The network control feature impacts my ability to manage network traffic across my endpoints and servers. We have not used this widely across all our partners, but wherever required, we use it. It has been an easy solution for those customers to get that control implemented. The elevation feature's role in facilitating just-in-time administrative access for approved applications shows that elevation control helps in many use cases involving remote control platforms, door usage, and security system platforms that require local admins. There are many solutions that provide this functionality, but the licensing cost seems to be expensive, and it also adds another solution into the mix. Rather than doing that, we try to use ThreatLocker Zero Trust Endpoint Protection Platform to achieve that control. Regarding the storage control feature, I have used it. The primary function is USB blocking, which is very widely adopted, and also just locking down and allowing certain users to access certain file locations helps us there. When it comes to enforcing policy-driven access over various storage devices, it depends on the business risk adapted by the companies that we support, but generally the use case is USB and external storage devices where companies know that is a risk, but they do not have appropriate solutions. There are EDR platforms that claim to do this, but ThreatLocker Zero Trust Endpoint Protection Platform does it at an advanced level. My assessment of the efficiency of the real-time threat intelligence and category controls employed by Web Control in blocking malicious and non-compliant sites leads me to think that Web Control is another functionality within ThreatLocker Zero Trust Endpoint Protection Platform that is an add-on on top of the current set. That is another solution that we use based on what is required for the company, but again, that is not widely adapted yet for our partners.
report
Use our free recommendation engine to learn which Anti-Malware Tools solutions are best for your needs.
886,174 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
11%
Financial Services Firm
11%
Computer Software Company
10%
Manufacturing Company
10%
Computer Software Company
17%
Financial Services Firm
9%
Manufacturing Company
8%
Retailer
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business11
Midsize Enterprise2
Large Enterprise2
By reviewers
Company SizeCount
Small Business51
Midsize Enterprise13
Large Enterprise8
 

Questions from the Community

What needs improvement with ESET Protect?
One area for improvement in ESET PROTECT Enterprise is its capabilities on Mac devices, which are less functional compared to Windows. In terms of device management, ESET PROTECT Enterprise could i...
What is your primary use case for ESET Protect?
My customers use ESET PROTECT Enterprise to secure all their operating systems; we have a lot of customers who rely on this antivirus. It also acts as a platform where I can manage all the devices ...
What advice do you have for others considering ESET Protect?
I suggest that other users considering ESET PROTECT Enterprise utilize this platform to manage all their laptops and apply security policies effectively to protect their Windows environments. On a ...
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
My experience with pricing, setup cost, and licensing for ThreatLocker Zero Trust Endpoint Protection Platform is good because it has a nominal price.I would say ThreatLocker Zero Trust Endpoint Pr...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker Zero Trust Endpoint Protection Platform can be improved by providing admin rights that allow us to manage it from the server by providing some token IDs or any kind of OTP if someone h...
What is your primary use case for ThreatLocker Allowlisting?
My main use case for ThreatLocker Zero Trust Endpoint Protection Platform is to secure the server.A specific example of how I use ThreatLocker Zero Trust Endpoint Protection Platform to secure my s...
 

Also Known As

ESET Protect, ESET File Security
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

Find out what your peers are saying about Microsoft, SentinelOne, Check Point Software Technologies and others in Anti-Malware Tools. Updated: April 2026.
886,174 professionals have used our research since 2012.