We're a managed service provider, mostly dealing with small business office environments, so ThreatLocker Zero Trust Endpoint Protection Platform is used in the context of many different tools. It's a unification of several different tools. Their front and center is their Application Control, where I believe the older, less correct name for it would be application whitelisting. Basically, it ensures that nothing can run within a given environment. As long as the machine is protected by ThreatLocker Zero Trust Endpoint Protection Platform, nothing can run within an environment that is not considered kosher by the admin.
If you don't allow it, it doesn't run with ThreatLocker Zero Trust Endpoint Protection Platform. It's as simple as that. I've had it block PowerShell scripts that my RMM has sent through. It's one of those things that in the moment, it's really annoying. However, the implication is that if that were anybody else, they wouldn't have been able to allow it.
I deal with ThreatLocker Zero Trust Endpoint Protection Platform. It provides peace of mind because it unifies a lot of different tools, including managed detection and response and Endpoint Detection and Response.
The single pane of glass management for all this functionality is really the best feature. It unifies many utilities that would have been separate costs before, and it lets us sleep at night knowing that things are being monitored 24 hours.
The ThreatLocker Zero Trust Endpoint Protection Platform auditing capabilities have provided valuable insights for us and have stopped several would-be malware infections.
Going with the theme of ThreatLocker Zero Trust Endpoint Protection Platform being a one-stop shop where they have just about everything, and they have a really good product stack as is. However, the one last thing I would want to see is mail security implemented similar to how Mail Protector does theirs, except obviously managed and included in a subscription tier with ThreatLocker Zero Trust Endpoint Protection Platform.
It's pretty easy to deploy as far as this functionality goes. However, it's very annoying to uninstall. You have to go into the online control panel and disable tampering for a device before it'll let you uninstall it without complaining really loudly. This is actually one of those things that is annoying in day-to-day operation because it assumes you don't know what you're doing. However, I would rather it let me know when it doesn't need to than have a situation where our protection is just being disabled and nothing's being done about it.
On a scale of 1 to 10, I would rate ThreatLocker Zero Trust Endpoint Protection Platform a nine. There's a little bit of smoothing they could do, but most of my annoyances with it are with the concept as a whole and there's not really anything anyone can do to fix them. It comes with the territory. It's not really something that they in particular could improve upon.
I have dealt with ThreatLocker Zero Trust Endpoint Protection Platform for a couple of years at this point.
The support with ThreatLocker Zero Trust Endpoint Protection Platform is phenomenal. Utterly phenomenal. I literally don't think I have ever waited more than a minute to hear back.
We've been Blackpoint customers for MDR, EDR before ThreatLocker Zero Trust Endpoint Protection Platform. They did not offer the Application Control or the network control, the storage control. ThreatLocker Zero Trust Endpoint Protection Platform added the MDR, EDR functionality as a logical extension of what they do with the application whitelisting, with the network control, with the storage control. It was just a logical extension. But Blackpoint only ever offered the MDR, EDR functionality. And as far as I know, they were only just starting to branch out into Application Control before we moved over to ThreatLocker Zero Trust Endpoint Protection Platform.
The zero-trust approach of ThreatLocker Zero Trust Endpoint Protection Platform has helped us pass certain certifications for cybersecurity. The zero-trust portion means that it's a little more annoying than traditional security software. However, you know for a fact that it's working because you can watch it stop stuff in real-time.
I do use the Application Control feature of ThreatLocker Zero Trust Endpoint Protection Platform. It is about as straightforward as you could hope for a tool. They offer many deployment options. They have an agent installer you can download. They have a deployment script that you can push through your RMM, or through a Group Policy type implementation.
I'm not very familiar with the pricing of ThreatLocker Zero Trust Endpoint Protection Platform. I don't look at the numbers typically as I focus on technological aspects and implementation. From what I understand, our licensing costs are actually fairly reasonable. For the tier we're at now, it's approximately $10 an endpoint, and we're easily able to upsell that. We're covering our costs and then a little bit on top. It's such a useful tool that if I were making the decision, I would probably even sell it at a loss and take a little bit of a chunk out of other managed service profit margins if necessary. ThreatLocker Zero Trust Endpoint Protection Platform is just that useful.
The way Ringfencing helps limit application actions is by allowing an application to run. However, that application is not allowed to talk to certain common threat vectors such as scripting hosts, PowerShell, macros, etc. That's how it's configured by default. You can configure it however you want. For example, I could stop Chrome from talking to Word if needed.
I rate ThreatLocker Zero Trust Endpoint Protection Platform a nine out of ten.