Company Website

Ratings and Reviews 499 Ratings

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is ThreatLocker?

ThreatLocker® empowers organizations—from businesses and government agencies to academic institutions—with the ability to control exactly which applications are allowed to run in their environments. Built on a Zero Trust foundation, our suite of powerful cybersecurity tools puts control back in your hands. We believe in a future where every organization can operate securely and independently, free from the disruption of cyberattacks. That’s why our team of seasoned cybersecurity experts designed ThreatLocker: to give you the tools to stop threats before they start. With decades of experience developing cutting-edge security solutions, including email and content protection, ThreatLocker is our most advanced and comprehensive platform yet. It’s built to help you reduce risk, simplify your stack, and take control. Learn more at ThreatLocker.com.

What is Learning Locker?

Learning Locker makes the process of acquiring knowledge straightforward and accessible, as it enables organizations to gather experience data from various systems into a unified platform, facilitating analysis and making learning outcomes quantifiable. Learning is truly omnipresent, and with Learning Locker's multi-tenant capabilities, users can establish several stores to collect diverse types of xAPI that cater to their specific data source and storage needs. The platform provides a robust API that enables the saving and reuse of essential user data, allowing for the categorization and reporting of xAPI data into customized groups. Additionally, intricate business rules can be applied to convert incoming activity data into new, consolidated activity records, which significantly streamlines both administrative functions and learning tasks. For those seeking an even more comprehensive solution, the Enterprise version offers fully managed services, including hosting and dedicated support, ensuring customers benefit from the most extensive features available, such as Business Intelligence connectors and configurable business rules. This level of support and functionality allows organizations to optimize their learning strategies effectively.

Media

Media

Integrations Supported

Acorn LMS
Auth0
Azure-AD-External-Identities
ConnectWise ScreenConnect
Datto SaaS Protection
Eurekos
Google Forms
HaloPSA
IT Glue
Kaseya BMS
Microsoft Power BI
Network Glue
Okta
ServiceNow
Sitepass
Splunk Cloud Platform
Splunk Enterprise
Tableau
ThreatAware

Integrations Supported

Acorn LMS
Auth0
Azure-AD-External-Identities
ConnectWise ScreenConnect
Datto SaaS Protection
Eurekos
Google Forms
HaloPSA
IT Glue
Kaseya BMS
Microsoft Power BI
Network Glue
Okta
ServiceNow
Sitepass
Splunk Cloud Platform
Splunk Enterprise
Tableau
ThreatAware

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

ThreatLocker

Date Founded

2017

Company Location

United States

Company Website

www.threatlocker.com

Company Facts

Organization Name

Learning Pool

Date Founded

2006

Company Location

United States

Company Website

www.learningpool.com

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Categories and Features

Business Intelligence

Ad Hoc Reports
Benchmarking
Budgeting & Forecasting
Dashboard
Data Analysis
Key Performance Indicators
Natural Language Generation (NLG)
Performance Metrics
Predictive Analytics
Profitability Analysis
Strategic Planning
Trend / Problem Indicators
Visual Analytics

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Learning Experience Platforms

Built-in Course Authoring
Content Sharing
Employee Portal
Gamification
Microlearning
Mobile Learning
Multi-User Collaboration
Recommendations
Reporting/Analytics
Self-Service Content Curation
Social Learning
Third Party Course Library

Learning Management Systems (LMS)

Academic / Education
Asynchronous Learning
Blended Learning
Built-In Course Authoring
Corporate / Business
Customizable
Gamification
Learner Portal
Mobile Learning
Open Source
SCORM Compliance
Synchronous Learning
Video Conferencing
eCommerce
eLearning Companies

Popular Alternatives

Popular Alternatives

CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike