---
description: Detaillierte Informationen über ThreatLocker zu Benutzerfreundlichkeit, Funktionen, Kosten, Vor- und Nachteilen aus verifizierten Nutzer-Erfahrungen. Lies Ratings & Bewertungen und entdecke ähnliche Tools.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: ThreatLocker Erfahrungen, Vor- und Nachteile – Capterra Deutschland 2026
---

Breadcrumb: [Startseite](/) > [PAM Software (Privileged Access Management)](/directory/31238/privileged-access-management/software) > [ThreatLocker](/software/195434/threatlocker-control)

# ThreatLocker

Canonical: https://www.capterra.com.de/software/195434/threatlocker-control

Seite: 1 / 5\
Weiter: [Nächste Seite](https://www.capterra.com.de/software/195434/threatlocker-control?page=2)

> Stoppe Ransomware mit Endpunktkontrollen, einschließlich der Unterstützung durch Allowlisting- und Ringfencing-Anwendungen.
> 
> Bewertung: **4.9/5** von 88 Nutzern. Top bewertet für **Weiterempfehlungsquote**.

-----

## Übersicht

### Wer verwendet ThreatLocker?

Branchen und Unternehmen jeder Größe, die Cybersicherheit mit einer Zero-Trust-Haltung ermöglichen möchten.

## Kurzstatistiken und Ratings

| Metrik | Bewertung | Detail |
| **Gesamt** | **4.9/5** | 88 Nutzerbewertungen |
| Bedienkomfort | 4.5/5 | Auf Basis der Gesamtbewertungen |
| Kundenbetreuung | 4.9/5 | Auf Basis der Gesamtbewertungen |
| Preis-Leistungs-Verhältnis | 4.8/5 | Auf Basis der Gesamtbewertungen |
| Funktionen | 4.8/5 | Auf Basis der Gesamtbewertungen |
| Empfehlungsprozentsatz | 90% | (9/10 Weiterempfehlungsquote) |

## Über den Anbieter

- **Unternehmen**: ThreatLocker
- **Gegründet**: 2015

## Gewerblicher Kontext

- **Preismodell**:  (Kostenlose Testversion)
- **Zielgruppe**: 2–10, 11–50, 51–200, 201–500, 501–1.000, 1.001–5.000, 5.001–10.000, 10.000+
- **Bereitstellungen und Plattformen**: Cloud, SaaS, webbasiert, Mac (Desktop), Windows (Desktop)
- **Unterstützte Sprachen**: Englisch
- **Verfügbare Länder**: Afghanistan, Albanien, Algerien, Amerikanisch-Samoa, Amerikanische Jungferninseln, Andorra, Angola, Anguilla, Antigua und Barbuda, Argentinien, Armenien, Aruba, Aserbaidschan, Australien, Bahamas, Bahrain, Bangladesch, Barbados, Belarus, Belgien und 206 weitere

## Funktionen

- Aktivitäts-Verfolgung
- Aktivitätsüberwachung
- Anomalie- / Malware-Erkennung
- Anwendungssicherheit
- Backup und Recovery
- Bedrohungsanalyse
- Berichterstattung / Analyse
- Datensicherheit
- Endpoint Protection
- Ereignisprotokolle
- Firewalls
- Gerätemanagement
- Konfigurationsmanagement
- Kontinuierliches Monitoring
- Korrektur-Management
- Netzwerksicherheit
- Problemmanagement
- Real-Time Monitoring
- Remote-Monitoring und -Management
- Remote-Zugriff/-Kontrolle
- Richtlinien Managemen-
- Richtlinienerstellung
- Risiko-Warnungen
- Server-Überwachung
- Terminplanung
- Threat Response
- Verhaltensbezogene Analysen
- Zugriffskontrollen / Berechtigungen
- Überwachung

## Integrationen (9 insgesamt)

- Auth0
- ConnectWise PSA
- Datto RMM
- HaloPSA
- IT Glue
- Kaseya BMS
- Okta
- ServiceNow
- Splunk Enterprise

## Optionen für Kundensupport

- E-Mail/Helpdesk
- FAQ/Forum
- Wissensdatenbank
- Telefon-Support
- 24/7 Live-Support
- Chat

## Category

- [PAM Software (Privileged Access Management)](https://www.capterra.com.de/directory/31238/privileged-access-management/software)

## Ähnliche Kategorien

- [PAM Software (Privileged Access Management)](https://www.capterra.com.de/directory/31238/privileged-access-management/software)
- [EDR Software (Endpoint Detection and Response)](https://www.capterra.com.de/directory/31695/endpoint-detection-and-response/software)
- [Endpoint Protection Software](https://www.capterra.com.de/directory/30907/endpoint-protection/software)
- [Sicherheitssoftware](https://www.capterra.com.de/directory/31037/cybersecurity/software)
- [PC Sicherheitsprogramme](https://www.capterra.com.de/directory/10005/computer-security/software)

## Alternativen

1. [N-central](https://www.capterra.com.de/software/13803/n-central) — 4.1/5 (195 reviews)
2. [Cove Data Protection](https://www.capterra.com.de/software/163343/backup-and-recovery) — 4.7/5 (217 reviews)
3. [N-sight RMM](https://www.capterra.com.de/software/163344/n-sight) — 4.3/5 (194 reviews)
4. [IT Glue](https://www.capterra.com.de/software/170401/itglue) — 4.6/5 (331 reviews)
5. [SuperOps](https://www.capterra.com.de/software/1017782/superopsai) — 4.6/5 (65 reviews)

## Nutzerbewertungen

### "ThreatLocker, the dependable partner." — 5.0/5

> **Craig** | *3. März 2026* | Informationstechnologie & -dienste | Empfehlungsbewertung: 10.0/10
> 
> **Vorteile**: ThreatLocker is a major partner/vendor of ours, and for good reason; they are dependable and cutting-edge when it comes to their services.
> 
> **Nachteile**: Protection comes at a price, but the premium is worth the investment. They are very responsive and do regular updates.

-----

### "Awesome software with awesome support" — 5.0/5

> **Nathan** | *2. Oktober 2024* | Informationstechnologie & -dienste | Empfehlungsbewertung: 10.0/10
> 
> **Vorteile**: As an MSP, ThreatLocker is a major tool in our security stack.  I have used\\tested a lot of security services in the past, but ThreatLocker is the best for the money I have found.  It gives us a large amount of insight and control over devices which makes it hard to pick a favorite part about ThreatLocker.  The product is awesome, but I really want to say my favorite part is the people behind it.  &#10;&#10;You are assigned a Solutions Engineer to help guide you through the process of deployment/configuration.  They are an amazing resource that I have never gotten with any other product.  Usually, software companies just drop you into the portal, show you a few things, then you never hear from them again.  Additionally, the support experience is the best I have ever seen with any software company.  They are very knowledgeable, quick (under 5 minutes), and always available via chat.  The MDR team also helps us have peace of mind that our devices are safe and secured with an action plan we set, even when we are away.
> 
> **Nachteile**: ThreatLocker is a robust solution.  It can be very daunting to get started and comes with a time commitment to learn\\configure.  I could see how some companies could struggle getting through that phase, but it is worth it.

-----

### "Good to be safe." — 5.0/5

> **Camie** | *17. August 2025* | Einzelhandel | Empfehlungsbewertung: 5.0/10
> 
> **Vorteile**: I like that I my computer software is constantly and consistently being monitored.  I can do my work while it does it’s in the back ground.
> 
> **Nachteile**: Sometimes they are overly cautious or overly sensitive.  But I suppose they know more of what’s out there in the cyber world.
> 
> I’ve had to re ask if I could open a website before because I was unaware that I had to type in a reason.  So my request was just automatically denied but never was told to me it was.  I waited a long time to be able to finish my work.

-----

### "Amazing Product - Shoutout to \[sensitive content hidden\]" — 5.0/5

> **Kieran** | *3. Oktober 2024* | Informationstechnologie & -dienste | Empfehlungsbewertung: 10.0/10
> 
> **Vorteile**: First of all the Service provided by Threatlocker (In my case \[sensitive content hidden\] who is an excellent engineer - who really took the time to understand our needs and really understands the product). The implementation is always my worry with these types of tools, the implementation has been seamless due to the learning process. Combine \[sensitive content hidden\] on the implementation side with the Cyber Heroes quick response time this is a great end to end product.
> 
> **Nachteile**: Alerting on Threats, this is being really picky. But more specific alerting on threats with embedded information would be great.
> 
> Fantastic, great product. Has increased our Security Posture business wide, has left me feeling so much more confident about the security of our infrastructure \&amp; endpoints.

-----

### "Admins -- ThreatLocker will help you sleep better\!" — 5.0/5

> **James** | *14. Oktober 2024* | Bildungsmanagement | Empfehlungsbewertung: 9.0/10
> 
> **Vorteile**: \[sensitive content hidden\] on of the solutions engineers is super knowledgeable.  He know his way around ThreatLocker like it was the back of his hand.  I like how comprehensive it is and how much tweaking can be done for apps and other settings.  ThreatLocker definitely helps me sleep better at night.
> 
> **Nachteile**: It is so comprehensive that it is a world unto itself, which means that it takes some learning to be able to make use of the tweaking.
> 
> Our overall experience has been excellent. We use ThreatLocker on all of our servers and as many user endpoints as we can.  It stops users in their tracks from installing random software or extensions that we do not approve of in our organization.

-----

Seite: 1 / 5\
Weiter: [Nächste Seite](https://www.capterra.com.de/software/195434/threatlocker-control?page=2)

## Links

- [Auf Capterra anzeigen](https://www.capterra.com.de/software/195434/threatlocker-control)

## Diese Seite ist in den folgenden Sprachen verfügbar

| Sprache | URL |
| de | <https://www.capterra.com.de/software/195434/threatlocker-control> |
| de-AT | <https://www.capterra.at/software/195434/threatlocker-control> |
| de-CH | <https://www.capterra.ch/software/195434/threatlocker-control> |
| en | <https://www.capterra.com/p/195434/ThreatLocker-Control/> |
| en-AE | <https://www.capterra.ae/software/195434/threatlocker-control> |
| en-AU | <https://www.capterra.com.au/software/195434/threatlocker-control> |
| en-CA | <https://www.capterra.ca/software/195434/threatlocker-control> |
| en-GB | <https://www.capterra.co.uk/software/195434/threatlocker-control> |
| en-IE | <https://www.capterra.ie/software/195434/threatlocker-control> |
| en-IL | <https://www.capterra.co.il/software/195434/threatlocker-control> |
| en-IN | <https://www.capterra.in/software/195434/threatlocker-control> |
| en-NZ | <https://www.capterra.co.nz/software/195434/threatlocker-control> |
| en-SG | <https://www.capterra.com.sg/software/195434/threatlocker-control> |
| en-ZA | <https://www.capterra.co.za/software/195434/threatlocker-control> |
| es | <https://www.capterra.es/software/195434/threatlocker-control> |
| es-AR | <https://www.capterra.com.ar/software/195434/threatlocker-control> |
| es-CL | <https://www.capterra.cl/software/195434/threatlocker-control> |
| es-CO | <https://www.capterra.co/software/195434/threatlocker-control> |
| es-CR | <https://www.capterra.co.cr/software/195434/threatlocker-control> |
| es-DO | <https://www.capterra.do/software/195434/threatlocker-control> |
| es-EC | <https://www.capterra.ec/software/195434/threatlocker-control> |
| es-MX | <https://www.capterra.mx/software/195434/threatlocker-control> |
| es-PA | <https://www.capterra.com.pa/software/195434/threatlocker-control> |
| es-PE | <https://www.capterra.pe/software/195434/threatlocker-control> |
| fr | <https://www.capterra.fr/software/195434/threatlocker-control> |
| fr-BE | <https://fr.capterra.be/software/195434/threatlocker-control> |
| fr-CA | <https://fr.capterra.ca/software/195434/threatlocker-control> |
| fr-LU | <https://www.capterra.lu/software/195434/threatlocker-control> |
| it | <https://www.capterra.it/software/195434/threatlocker-control> |
| nl | <https://www.capterra.nl/software/195434/threatlocker-control> |
| nl-BE | <https://www.capterra.be/software/195434/threatlocker-control> |
| pl | <https://www.capterra.pl/software/195434/threatlocker-control> |
| pt | <https://www.capterra.com.br/software/195434/threatlocker-control> |
| pt-PT | <https://www.capterra.pt/software/195434/threatlocker-control> |

-----

## Strukturierte Daten

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Deutschland","address":{"@type":"PostalAddress","addressLocality":"München","addressRegion":"BY","postalCode":"81829","streetAddress":"Lehrer-Wirth-Str. 2 81829 München Deutschland"},"description":"Capterra Deutschland hilft Millionen von Nutzern die richtige Software für ihr Unternehmen zu finden – Vergleiche Tausende von Bewertungen & Ratings von top Softwareanwendungen.","email":"info@capterra.com.de","url":"https://www.capterra.com.de/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.com.de/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://www.linkedin.com/company/capterra/","https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.youtube.com/channel/UCYjWLCZnOKY90NAS9bFenIQ"]},{"name":"ThreatLocker","description":"Nur nach Bedrohungen zu suchen, reicht für IT-Fachkräfte nicht aus, um Ransomware Einhalt zu gebieten. ThreatLocker hilft dir, deine Angriffsflächen mit richtliniengesteuerter Endpunktsicherheit zu reduzieren. Anstatt nur bekannte Bedrohungen zu blockieren, kann du alles blockieren, was nicht ausdrücklich erlaubt ist. In Kombination mit Ringfencing und zusätzlichen Kontrollen ermöglichst du eine Zero-Trust-Haltung am Endpunkt, um böswillige Angriffe zu blockieren.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/e79bcc66-2ba7-45c1-839f-9f988452f817.png","url":"https://www.capterra.com.de/software/195434/threatlocker-control","@type":"SoftwareApplication","@id":"https://www.capterra.com.de/software/195434/threatlocker-control#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.capterra.com.de/#organization"},"aggregateRating":{"@type":"AggregateRating","bestRating":5,"ratingCount":88,"ratingValue":4.9},"operatingSystem":"Cloud, Apple, Windows"},{"@type":"FAQPage","@id":"https://www.capterra.com.de/software/195434/threatlocker-control#faqs","mainEntity":[{"name":"Was ist ThreatLocker?","@type":"Question","acceptedAnswer":{"text":"Nur nach Bedrohungen zu suchen, reicht für IT-Fachkräfte nicht aus, um Ransomware Einhalt zu gebieten. ThreatLocker hilft dir, deine Angriffsflächen mit richtliniengesteuerter Endpunktsicherheit zu reduzieren. Anstatt nur bekannte Bedrohungen zu blockieren, kann du alles blockieren, was nicht ausdrücklich erlaubt ist. In Kombination mit Ringfencing und zusätzlichen Kontrollen ermöglichst du eine Zero-Trust-Haltung am Endpunkt, um böswillige Angriffe zu blockieren.","@type":"Answer"}},{"name":"Wer verwendet ThreatLocker?","@type":"Question","acceptedAnswer":{"text":"Branchen und Unternehmen jeder Größe, die Cybersicherheit mit einer Zero-Trust-Haltung ermöglichen möchten.","@type":"Answer"}}]},{"@type":"BreadcrumbList","itemListElement":[{"name":"Startseite","position":1,"item":"/","@type":"ListItem"},{"name":"PAM Software (Privileged Access Management)","position":2,"item":"/directory/31238/privileged-access-management/software","@type":"ListItem"},{"name":"ThreatLocker","position":3,"item":"/software/195434/threatlocker-control","@type":"ListItem"}],"@id":"https://www.capterra.com.de/software/195434/threatlocker-control#breadcrumblist"}]}
</script>
