

Portnox and ThreatLocker compete in the network and endpoint protection category. ThreatLocker has the upper hand due to its robust security capabilities, making it ideal for security-focused buyers, while Portnox appeals to those prioritizing ease of management and pricing.
Features: Portnox offers network access control, policy enforcement, and security posture assessment, focusing on efficient network management. ThreatLocker provides application control, ringfencing, and data security, offering deeper security control and enhancing endpoint protection.
Room for Improvement: Portnox can improve its proactive customer service, enhance its complex setup support, and expand its feature set to appeal to more security-conscious buyers. ThreatLocker could benefit from simplifying its deployment process, offering more intuitive management options, and reducing system resource usage to streamline operations.
Ease of Deployment and Customer Service: ThreatLocker has a more intense deployment process due to its comprehensive security scope, supported by proactive customer service. Portnox offers a faster deployment with intuitive management but is perceived to have less proactive customer support compared to ThreatLocker.
Pricing and ROI: Portnox is competitively priced with lower initial setup costs, appealing to budget-conscious organizations. ThreatLocker, while requiring a higher investment, provides a substantial ROI for companies that prioritize extensive security features, justifying its premium pricing for comprehensive security needs.
If I compare this to an on-premises environment using Cisco ISE or Aruba ClearPass, it would require phenomenally large teams for infrastructure management.
If you were moving from a traditional on-premise NAC that was 100% managed by the IT department, there would be great savings in going to a cloud-based NAC with Portnox.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
The main return on investment is peace of mind, knowing that with ThreatLocker on any endpoint, it will almost always block all malicious code or exploits, even zero-day exploits.
It keeps malware, Trojans, and ransomware at bay.
The main area needing improvement is the technical knowledge of support staff.
For very high severity issues where the entire office is non-functional, response time is within 30 minutes.
They respond very immediately and provide detailed, amazing support.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
They ensure the backend can support it and do the provisioning while maintaining headroom and elasticity.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
I would rate it a ten out of ten for scalability.
The product itself is available and its uptime is 100%.
In the four years that I used Portnox, if it crashed or the server crashed, that would not have been more than once.
If there is a version one and another version, the communication between the organization using it and Portnox should be firm so they can coordinate effectively.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
Ideally, we should be able to search for any MAC address in the database, regardless of its authentication status, to see all its associated groups and potential conflicts.
When I'm doing filtering at times, it doesn't filter the items properly.
They don't have much support during Asia Pacific hours.
Controlling the cloud environment, not just endpoints, is crucial.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
If you compare Portnox with all other well-known standard products, it is the cheapest.
The pricing is a bit high, possibly due to the cloud features and running instances across regions like the US, Asia, and Europe.
You are charged according to the number of users.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
I had a really good deal at the time, and it continues to be cost-effective.
It's notable how Portnox has improved operational efficiency.
It is a very robust application because three teams use that part: the network team, the security team, and the support people.
It is very easy to implement on our current network hardware.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
| Product | Market Share (%) |
|---|---|
| ThreatLocker Zero Trust Endpoint Protection Platform | 1.1% |
| Portnox | 5.5% |
| Other | 93.4% |

| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 5 |
| Large Enterprise | 7 |
| Company Size | Count |
|---|---|
| Small Business | 32 |
| Midsize Enterprise | 4 |
| Large Enterprise | 3 |
Portnox provides advanced network visibility and proactive security without complexity, ensuring easy setup and scalability. Its agentless nature and intuitive design enable seamless device management and system integration, promoting efficient network operations and endpoint security.
Portnox is known for offering comprehensive network access control, providing firms with vital tools for managing authentication and securing endpoint devices. It's praised for ease of use in integrating with systems such as RADIUS servers and offering detailed analytical capabilities to ensure compliance and control unauthorized access. While users appreciate the intuitive interface and device management, improvements have been suggested in the areas of better GUI, integration with firewalls, and enhanced configuration methods. Portnox aids in handling dynamic VLAN assignments and securing access in both wired and wireless networks, proving particularly valuable for on-premises and remote environments.
What are the key features of Portnox?In industries where network security is paramount, such as finance and healthcare, Portnox is implemented to fortify access control and manage endpoint connections effectively. Its ability to secure both on-premises and remote environments makes it a versatile choice across sectors that require stringent access management, particularly where unauthorized device connections pose significant risks.
ThreatLocker Zero Trust Endpoint Protection Platform empowers organizations with application control, selective elevation, and ring-fencing to enhance security and prevent unauthorized access.
ThreatLocker provides comprehensive security management using application allowlisting to ensure only approved software operates across servers and workstations. The platform's centralized management simplifies security processes by consolidating multiple tools, and its robust capabilities align with zero-trust strategies by actively blocking unauthorized applications and ensuring compliance. Users note intuitive features such as mobile access, helpful training resources, and responsive support, which effectively reduce operational costs and help desk inquiries. The managed service providers prefer ThreatLocker to maintain network integrity by preventing malicious scripts and unauthorized access attempts. However, users identify room for growth in training and support flexibility, the interface, and certain technical challenges like network saturation from policy updates.
What are the most important features?Organizations utilize ThreatLocker for application allowlisting, ensuring only authorized software operates to prevent unauthorized access efficiently. Deployed across servers and workstations, its features support zero-trust principles and are favored by managed service providers for application management and network integrity.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.