---
description: Reviews zu ThreatLocker Software: Systemübersicht, Funktionen, Preisinformationen und Ratings & Reviews. Entdecke kostenlose Live-Demos und vergleiche ThreatLocker mit ähnlichen Programmen.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: ThreatLocker | Bewertungen, Preise und Demos – SoftwareAdvice DE
---

Breadcrumb: [Startseite](/) > [Endpoint Protection Software](/directory/4777/endpoint-protection-software/software) > [ThreatLocker](/software/314278/threatlocker)

# ThreatLocker

Canonical: https://www.softwareadvice.de/software/314278/threatlocker

Seite: 1 / 5\
Weiter: [Nächste Seite](https://www.softwareadvice.de/software/314278/threatlocker?page=2)

> Stoppe Ransomware. ThreatLocker hilft Unternehmen, ihre Angriffsflächen mit richtliniengesteuerter Endpunktsicherheit zu reduzieren. Anstatt nur bekannte Bedrohungen zu blockieren, kannst du alles blockieren, was nicht explizit vertrauenswürdig ist. Durch die Kombination von Allowlisting mit den Ringfencing-Richtlinien zur Anwendungseindämmung und -speicherung verbesserst du deine Zero-Trust-Haltung und blockierst arglistige Angriffe.
> 
> Bewertung: **4.9/5** von 88 Nutzern. Top bewertet für **Weiterempfehlungsquote**.

-----

## Kurzstatistiken und Ratings

| Metrik | Bewertung | Detail |
| **Gesamt** | **4.9/5** | 88 Nutzerbewertungen |
| Bedienkomfort | 4.5/5 | Auf Basis der Gesamtbewertungen |
| Kundenbetreuung | 4.9/5 | Auf Basis der Gesamtbewertungen |
| Preis-Leistungs-Verhältnis | 4.8/5 | Auf Basis der Gesamtbewertungen |
| Funktionen | 4.8/5 | Auf Basis der Gesamtbewertungen |
| Empfehlungsprozentsatz | 90% | (9/10 Weiterempfehlungsquote) |

## Über den Anbieter

- **Unternehmen**: ThreatLocker
- **Gegründet**: 2015

## Gewerblicher Kontext

- **Preismodell**:  (Kostenlose Testversion)
- **Zielgruppe**: 2–10, 11–50, 51–200, 201–500, 501–1.000, 1.001–5.000, 5.001–10.000, 10.000+
- **Bereitstellungen und Plattformen**: Cloud, SaaS, webbasiert, Mac (Desktop), Windows (Desktop)
- **Unterstützte Sprachen**: Englisch
- **Verfügbare Länder**: Afghanistan, Albanien, Algerien, Amerikanisch-Samoa, Amerikanische Jungferninseln, Andorra, Angola, Anguilla, Antigua und Barbuda, Argentinien, Armenien, Aruba, Aserbaidschan, Australien, Bahamas, Bahrain, Bangladesch, Barbados, Belarus, Belgien und 206 weitere

## Funktionen

- API
- Aktivitäts-Dashboard
- Aktivitäts-Verfolgung
- Aktivitätsüberwachung
- Alarmfunktion / Benachrichtigungen
- Alerts/Escalation
- Anomalie- / Malware-Erkennung
- Anpassbare Berichte
- Anwendungssicherheit
- Audit Trail
- Backup und Recovery
- Bedrohungsanalyse
- Berichterstattung / Analyse
- Berichterstattung und Statistik
- Dashboard
- Datensicherheit
- Drittanbieter-Integration
- Endpoint Management
- Endpoint Protection
- Ereignisprotokolle

## Integrationen (9 insgesamt)

- Auth0
- ConnectWise PSA
- Datto RMM
- HaloPSA
- IT Glue
- Kaseya BMS
- Okta
- ServiceNow
- Splunk Enterprise

## Optionen für Kundensupport

- E-Mail/Helpdesk
- FAQ/Forum
- Wissensdatenbank
- Telefon-Support
- 24/7 Live-Support
- Chat

## Category

- [Endpoint Protection Software](https://www.softwareadvice.de/directory/4777/endpoint-protection-software/software)

## Ähnliche Kategorien

- [Endpoint Protection Software](https://www.softwareadvice.de/directory/4777/endpoint-protection-software/software)
- [PAM Software (Privileged Access Management)](https://www.softwareadvice.de/directory/4241/privileged-access-management/software)
- [EDR Software (Endpoint Detection and Response)](https://www.softwareadvice.de/directory/3977/edr/software)
- [PC Sicherheitsprogramme](https://www.softwareadvice.de/directory/4528/security/software)
- [NAC Software (Netzwerkzugriffskontrolle)](https://www.softwareadvice.de/directory/4433/network-access-control/software)

## Alternativen

1. [N-central](https://www.softwareadvice.de/software/161863/solarwinds-n-central) — 4.1/5 (240 reviews)
2. [Cove Data Protection](https://www.softwareadvice.de/software/171880/solarwinds-backup) — 4.6/5 (312 reviews)
3. [N-sight RMM](https://www.softwareadvice.de/software/30397/solarwinds-remote) — 4.3/5 (194 reviews)
4. [IT Glue](https://www.softwareadvice.de/software/351312/it-glue) — 4.6/5 (331 reviews)
5. [ManageEngine OpManager MSP](https://www.softwareadvice.de/software/361458/manageengine-opmanager-msp) — 4.4/5 (72 reviews)

## Nutzerbewertungen

### "Environment Security with ThreatLocker" — 5.0/5

> **Surbhi** | *20. Januar 2025* | Informationstechnologie & -dienste | Empfehlungsbewertung: 9.0/10
> 
> **Vorteile**: 1. Easily capture the vulnerable applications and blocked those.&#10;2. Very easy deployment of this security software.&#10;3. It provides a mobile application as well which is very convinient to give responses on alerts.
> 
> **Nachteile**: 1. To make changes in the already running environment , it is quite difficult.&#10;2. Very slow performance of this product observed.
> 
> It gives zero trust security to machines , very scalable to block the unwanted things. Difficult to make changes in production environment along with multiple access issues faced.

-----

### "Total Control and Peace of Mind – My Journey with ThreatLocker\!" — 4.0/5

> **Anonymer Nutzer** | *12. November 2025* | Logistik & Lieferkette | Empfehlungsbewertung: 7.0/10
> 
> **Vorteile**: I​‍​‌‍​‍‌ have been using ThreatLocker for several months, and it stands out as one of the most powerful cybersecurity tools in my toolkit. Its commitment to a Zero Trust model literally blew my mind. After the installation, I was amazed by how much control I actually had over the allowed applications and scripts on our systems. The whole thing was a total overhaul of how we do endpoint protection.&#10;\* Strong Zero Trust Protection: The “deny by default” strategy implemented by ThreatLocker gives absolute control over the operations of which applications and scripts, thus the likelihood of ransomware and malware attacks is drastically reduced.&#10;\* Powerful Application Allowlisting: The allowlisting capability is highly accurate and efficient — after the completion of the setup, it acts as a security layer that permits software to run only if they are pre-approved, thus providing unbeatable endpoint security.&#10;\* Ringfencing Technology: This technology helps the separation of the different functionalities of an application so that they cannot access data or other programs unless it is necessary, thus preventing lateral attacks and data leaks.&#10;\* Comprehensive Visibility: The control panel provides an accurate and up-to-the-minute picture of what each device is doing, thus facilitating monitoring and auditing ​‍​‌‍​‍‌considerably.
> 
> **Nachteile**: I​‍​‌‍​‍‌ encountered several issues with this platform.&#10;Initial Setup Complexity: The setup was quite overwhelming when I first started using ThreatLocker. While the platform offers a lot of control and customization, it still takes a considerable amount of time to understand and properly configure the policies.&#10;Learning Curve: The product implements a Zero Trust model; hence, it requires some technical background. A new admin or a small team without a dedicated IT staff might find it difficult initially.&#10;Frequent Policy Adjustments: Initially, I had to constantly adjust the settings to allow the legitimate applications, which was somewhat inconvenient until the system got familiar with our ​‍​‌‍​‍‌environment.
> 
> I​‍​‌‍​‍‌ really enjoyed working with ThreatLocker. It is a very effective tool to actually implement the concept of Zero Trust security — giving you full insight and control over what is happening in your environment. Once I got past the initial learning curve, it was really obvious to me how effectively it stops unauthorized applications and possible threats from getting started.&#10;The app's allowlisting and ringfencing functionalities have been a complete turnaround in how I deal with security. I don’t have to worry about new software or ransomware coming in, as everything that is running is what I have definitely ​‍​‌‍​‍‌approved.

-----

### "threatlocker vs the others" — 5.0/5

> **Verifizierter Rezensent** | *20. Dezember 2022* | Hochschulbildung | Empfehlungsbewertung: 5.0/10
> 
> **Vorteile**: it is very easy to intall new policies. have very good looking interface it easy to use
> 
> **Nachteile**: really i dont have nothing negative about this

-----

### "ThreatLocker a Requirement for your Security Stack\!" — 5.0/5

> **Matthew** | *11. Februar 2025* | Informationstechnologie & -dienste | Empfehlungsbewertung: 10.0/10
> 
> **Vorteile**: The Vendor Support has been Fantastic\! Their Application Control and Elevation Control has been a great addition to DiD Security Stack\! The ability to overwrite Microsoft Windows default UAC with ThreatLocker and give end users more control over apps that are approved to run is a huge help for those tools that require Admin writes just to function.
> 
> **Nachteile**: The ability to control the Tray settings and the ability to add customer popups to the Request Access popup is my least favorite part of the tool. It's pretty limited and doesn't allow much ability to customization options.
> 
> I've been using ThreatLocker for about four years now within our primary security stack, and it has been rock solid. We primarily use their Application Control function, but we have also demoed their EDR solution, which is incredibly strong and significantly lighter weight than other EDRs on the market.&#10;&#10;The Application Control portion has been amazing, provided you put in the effort to tune the software for the tools you use. Their engineers are great to work with, and I haven't had a bad experience with them to date. \[sensitive content hidden\] (engineer) and \[sensitive content hidden\] (Account Rep) have been fantastic at keeping us updated on what's coming and assisting with any issues that arise.&#10;&#10;The tool is incredibly stable on our endpoints, and we've only seen minor breaks on devices with crazy high uptimes. We manage over 7,700 endpoints, all containing ThreatLocker Application Control. We couldn't recommend this tool enough if you want to keep your endpoints safe. It has single-handedly saved customers from potential compromise due to the way it allows and denies applications.

-----

### "ThreatLocker is an outstanding product backed by an oustanding team" — 5.0/5

> **Paul** | *6. Februar 2025* | Informationstechnologie & -dienste | Empfehlungsbewertung: 10.0/10
> 
> **Vorteile**: Overall it has been a fantastic experience the software and solution is solid and the support and team have been invaluable getting this implemented across our customer base.  Once properly implemented (which does take time and effort) it provides a controlled, safe environment and sets secure boundaries for our clients systems without the large performance overheads that so many other applications impose.&#10;&#10;The cost of Threatlocker and the time you need to provide to getting it set-up is absolutely worth it.  Not only does the application deliver peace of mind to the customer environments we have deployed it to, it also gives us confidence knowing they are safe and secure.  It ticks all the boxes for one of the biggest challenges out there and that's securing customers and meeting Cyber Security requirements.
> 
> **Nachteile**: I don't quite see this as a con personally but prospective customers need to be aware that this is a complex security tool which requires a large commitment of time and effort to get configured. It's not by any stretch of the imagination and tool that you just install and forget.
> 
> One of the best things about ThreatLocker is the don't just sell you the product and then leave you hanging without support or worst still charge you for the support after the initial sale like so many other companies.  To be honest it was a breath of fresh air in comparison to so many other companies.  They provide you with a dedicated team to ensure you get the most out of the product and that it runs optimally.  &#10;&#10;We were assigned a very kind chap \[sensitive content hidden\]  who deserves a huge shout out for his outstanding efforts and commitment to getting us up and running. Nothing was too much trouble he was on hand every step of the way helping us deliver ThreatLocker to all our customers but one in particular was a nightmare. Nonetheless \[sensitive content hidden\] rose to the challenge helping train, guide and often finding solutions to allowing some rather interesting applications coexist with ThreatLocker whilst securing the environment.  &#10;&#10;We are still very much on a journey with \[sensitive content hidden\] and the team at ThreatLocker but the hard work is most certainly paying off and we wouldn't hesitate recommending ThreatLocker to anyone.  The Cyber Hero team are available 24/7 and are always ready to help with any questions about the service or best practices and have now become an extension of our own team.

-----

Seite: 1 / 5\
Weiter: [Nächste Seite](https://www.softwareadvice.de/software/314278/threatlocker?page=2)

## Links

- [Auf SoftwareAdvice anzeigen](https://www.softwareadvice.de/software/314278/threatlocker)

## Diese Seite ist in den folgenden Sprachen verfügbar

| Sprache | URL |
| de | <https://www.softwareadvice.de/software/314278/threatlocker> |
| en | <https://www.softwareadvice.com/security/threatlocker-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/314278/threatlocker> |
| en-GB | <https://www.softwareadvice.co.uk/software/314278/threatlocker> |
| en-IE | <https://www.softwareadvice.ie/software/314278/threatlocker> |
| en-NZ | <https://www.softwareadvice.co.nz/software/314278/threatlocker> |
| fr | <https://www.softwareadvice.fr/software/314278/threatlocker> |

-----

## Strukturierte Daten

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Deutschland","address":{"@type":"PostalAddress","addressLocality":"München","addressRegion":"BY","postalCode":"81829","streetAddress":"Lehrer-Wirth-Str. 2 81829 München Deutschland"},"description":"Softwaresuche leicht gemacht. Wir helfen Unternehmen in Deutschland, die richtige Software zu finden.","email":"info@softwareadvice.de","url":"https://www.softwareadvice.de/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.de/#organization","@type":"Organization","parentOrganization":"G2.com, Inc.","sameAs":[]},{"name":"ThreatLocker","description":"Stoppe Ransomware. ThreatLocker hilft Unternehmen, ihre Angriffsflächen mit richtliniengesteuerter Endpunktsicherheit zu reduzieren. Anstatt nur bekannte Bedrohungen zu blockieren, kannst du alles blockieren, was nicht explizit vertrauenswürdig ist. Durch die Kombination von Allowlisting mit den Ringfencing-Richtlinien zur Anwendungseindämmung und -speicherung verbesserst du deine Zero-Trust-Haltung und blockierst arglistige Angriffe.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/f9498ebb-5057-41ac-9d76-e4eda3c0ba81.png","url":"https://www.softwareadvice.de/software/314278/threatlocker","@id":"https://www.softwareadvice.de/software/314278/threatlocker#software","@type":"SoftwareApplication","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.de/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.9,"bestRating":5,"ratingCount":88},"operatingSystem":"Cloud, Apple, Windows"},{"@id":"https://www.softwareadvice.de/software/314278/threatlocker#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Startseite","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Protection Software","position":2,"item":"/directory/4777/endpoint-protection-software/software","@type":"ListItem"},{"name":"ThreatLocker","position":3,"item":"/software/314278/threatlocker","@type":"ListItem"}]}]}
</script>
