---
description: Detaillierte Informationen über ThreatLocker zu Benutzerfreundlichkeit, Funktionen, Kosten, Vor- und Nachteilen aus verifizierten Nutzer-Erfahrungen. Lies Ratings & Bewertungen und entdecke ähnliche Tools.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: ThreatLocker Erfahrungen, Vor- und Nachteile – Capterra Deutschland 2026
---

Breadcrumb: [Startseite](/) > [PAM Software (Privileged Access Management)](/directory/31238/privileged-access-management/software) > [ThreatLocker](/software/195434/threatlocker-control)

# ThreatLocker

Canonical: https://www.capterra.com.de/software/195434/threatlocker-control

Page: 1 / 5\
Weiter: [Next page](https://www.capterra.com.de/software/195434/threatlocker-control?page=2)

> Stoppe Ransomware mit Endpunktkontrollen, einschließlich der Unterstützung durch Allowlisting- und Ringfencing-Anwendungen.
> 
> Verdict: Rated **4.9/5** by 87 users. Top-rated for **Weiterempfehlungsquote**.

-----

## Übersicht

### Wer verwendet ThreatLocker?

Branchen und Unternehmen jeder Größe, die Cybersicherheit mit einer Zero-Trust-Haltung ermöglichen möchten.

## Quick Stats & Ratings

| Metric | Bewertung | Detail |
| **Gesamt** | **4.9/5** | 87 Nutzerbewertungen |
| Bedienkomfort | 4.5/5 | Based on overall reviews |
| Kundenbetreuung | 4.9/5 | Based on overall reviews |
| Preis-Leistungs-Verhältnis | 4.8/5 | Based on overall reviews |
| Funktionen | 4.8/5 | Based on overall reviews |
| Recommendation percentage | 90% | (9/10 Weiterempfehlungsquote) |

## Über den Anbieter

- **Unternehmen**: ThreatLocker
- **Founded**: 2015

## Commercial Context

- **Startpreis**: 0,01 $
- **Preismodell**:  (Kostenlose Testversion)
- **Target Audience**: 2–10, 11–50, 51–200, 201–500, 501–1.000, 1.001–5.000
- **Deployment & Platforms**: Cloud, SaaS, webbasiert, Mac (Desktop), Windows (Desktop)
- **Unterstützte Sprachen**: Englisch
- **Available Countries**: Afghanistan, Albanien, Algerien, Amerikanisch-Samoa, Amerikanische Jungferninseln, Andorra, Angola, Anguilla, Antigua und Barbuda, Argentinien, Armenien, Aruba, Aserbaidschan, Australien, Bahamas, Bahrain, Bangladesch, Barbados, Belarus, Belgien and 206 more

## Funktionen

- Aktivitäts-Verfolgung
- Aktivitätsüberwachung
- Anomalie- / Malware-Erkennung
- Anwendungssicherheit
- Backup und Recovery
- Bedrohungsanalyse
- Berichterstattung / Analyse
- Datensicherheit
- Endpoint Protection
- Ereignisprotokolle
- Firewalls
- Gerätemanagement
- Konfigurationsmanagement
- Kontinuierliches Monitoring
- Korrektur-Management
- Netzwerksicherheit
- Problemmanagement
- Real-Time Monitoring
- Remote-Monitoring und -Management
- Remote-Zugriff/-Kontrolle
- Richtlinien Managemen-
- Richtlinienerstellung
- Risiko-Warnungen
- Server-Überwachung
- Terminplanung
- Threat Response
- Verhaltensbezogene Analysen
- Zugriffskontrollen / Berechtigungen
- Überwachung

## Integrations (9 total)

- Auth0
- ConnectWise PSA
- Datto RMM
- HaloPSA
- IT Glue
- Kaseya BMS
- Okta
- ServiceNow
- Splunk Enterprise

## Optionen für Kundensupport

- E-Mail/Helpdesk
- FAQ/Forum
- Wissensdatenbank
- Telefon-Support
- 24/7 Live-Support
- Chat

## Category

- [PAM Software (Privileged Access Management)](https://www.capterra.com.de/directory/31238/privileged-access-management/software)

## Ähnliche Kategorien

- [PAM Software (Privileged Access Management)](https://www.capterra.com.de/directory/31238/privileged-access-management/software)
- [EDR Software (Endpoint Detection and Response)](https://www.capterra.com.de/directory/31695/endpoint-detection-and-response/software)
- [Endpoint Protection Software](https://www.capterra.com.de/directory/30907/endpoint-protection/software)
- [Sicherheitssoftware](https://www.capterra.com.de/directory/31037/cybersecurity/software)
- [PC Sicherheitsprogramme](https://www.capterra.com.de/directory/10005/computer-security/software)

## Alternativen

1. [SuperOps](https://www.capterra.com.de/software/1017782/superopsai) — 4.6/5 (65 reviews)
2. [ManageEngine OpManager MSP](https://www.capterra.com.de/software/212602/manageengine-opmanager-msp) — 4.4/5 (72 reviews)
3. [N-central](https://www.capterra.com.de/software/13803/n-central) — 4.1/5 (195 reviews)
4. [Cove Data Protection](https://www.capterra.com.de/software/163343/backup-and-recovery) — 4.7/5 (216 reviews)
5. [N-sight RMM](https://www.capterra.com.de/software/163344/n-sight) — 4.3/5 (194 reviews)

## Nutzerbewertungen

### "ThreatLocker, the dependable partner." — 5.0/5

> **Craig** | *3. März 2026* | Informationstechnologie & -dienste | Recommendation rating: 10.0/10
> 
> **Vorteile**: ThreatLocker is a major partner/vendor of ours, and for good reason; they are dependable and cutting-edge when it comes to their services.
> 
> **Nachteile**: Protection comes at a price, but the premium is worth the investment. They are very responsive and do regular updates.

-----

### "Awesome software with awesome support" — 5.0/5

> **Nathan** | *2. Oktober 2024* | Informationstechnologie & -dienste | Recommendation rating: 10.0/10
> 
> **Vorteile**: As an MSP, ThreatLocker is a major tool in our security stack.  I have used\\tested a lot of security services in the past, but ThreatLocker is the best for the money I have found.  It gives us a large amount of insight and control over devices which makes it hard to pick a favorite part about ThreatLocker.  The product is awesome, but I really want to say my favorite part is the people behind it.  &#10;&#10;You are assigned a Solutions Engineer to help guide you through the process of deployment/configuration.  They are an amazing resource that I have never gotten with any other product.  Usually, software companies just drop you into the portal, show you a few things, then you never hear from them again.  Additionally, the support experience is the best I have ever seen with any software company.  They are very knowledgeable, quick (under 5 minutes), and always available via chat.  The MDR team also helps us have peace of mind that our devices are safe and secured with an action plan we set, even when we are away.
> 
> **Nachteile**: ThreatLocker is a robust solution.  It can be very daunting to get started and comes with a time commitment to learn\\configure.  I could see how some companies could struggle getting through that phase, but it is worth it.

-----

### "Good to be safe." — 5.0/5

> **Camie** | *17. August 2025* | Einzelhandel | Recommendation rating: 5.0/10
> 
> **Vorteile**: I like that I my computer software is constantly and consistently being monitored.  I can do my work while it does it’s in the back ground.
> 
> **Nachteile**: Sometimes they are overly cautious or overly sensitive.  But I suppose they know more of what’s out there in the cyber world.
> 
> I’ve had to re ask if I could open a website before because I was unaware that I had to type in a reason.  So my request was just automatically denied but never was told to me it was.  I waited a long time to be able to finish my work.

-----

### "Total Control and Peace of Mind – My Journey with ThreatLocker\!" — 4.0/5

> **Anonymous User** | *12. November 2025* | Logistik & Lieferkette | Recommendation rating: 7.0/10
> 
> **Vorteile**: I​‍​‌‍​‍‌ have been using ThreatLocker for several months, and it stands out as one of the most powerful cybersecurity tools in my toolkit. Its commitment to a Zero Trust model literally blew my mind. After the installation, I was amazed by how much control I actually had over the allowed applications and scripts on our systems. The whole thing was a total overhaul of how we do endpoint protection.&#10;\* Strong Zero Trust Protection: The “deny by default” strategy implemented by ThreatLocker gives absolute control over the operations of which applications and scripts, thus the likelihood of ransomware and malware attacks is drastically reduced.&#10;\* Powerful Application Allowlisting: The allowlisting capability is highly accurate and efficient — after the completion of the setup, it acts as a security layer that permits software to run only if they are pre-approved, thus providing unbeatable endpoint security.&#10;\* Ringfencing Technology: This technology helps the separation of the different functionalities of an application so that they cannot access data or other programs unless it is necessary, thus preventing lateral attacks and data leaks.&#10;\* Comprehensive Visibility: The control panel provides an accurate and up-to-the-minute picture of what each device is doing, thus facilitating monitoring and auditing ​‍​‌‍​‍‌considerably.
> 
> **Nachteile**: I​‍​‌‍​‍‌ encountered several issues with this platform.&#10;Initial Setup Complexity: The setup was quite overwhelming when I first started using ThreatLocker. While the platform offers a lot of control and customization, it still takes a considerable amount of time to understand and properly configure the policies.&#10;Learning Curve: The product implements a Zero Trust model; hence, it requires some technical background. A new admin or a small team without a dedicated IT staff might find it difficult initially.&#10;Frequent Policy Adjustments: Initially, I had to constantly adjust the settings to allow the legitimate applications, which was somewhat inconvenient until the system got familiar with our ​‍​‌‍​‍‌environment.
> 
> I​‍​‌‍​‍‌ really enjoyed working with ThreatLocker. It is a very effective tool to actually implement the concept of Zero Trust security — giving you full insight and control over what is happening in your environment. Once I got past the initial learning curve, it was really obvious to me how effectively it stops unauthorized applications and possible threats from getting started.&#10;The app's allowlisting and ringfencing functionalities have been a complete turnaround in how I deal with security. I don’t have to worry about new software or ransomware coming in, as everything that is running is what I have definitely ​‍​‌‍​‍‌approved.

-----

### "Amazing Product - Shoutout to \[sensitive content hidden\]" — 5.0/5

> **Kieran** | *3. Oktober 2024* | Informationstechnologie & -dienste | Recommendation rating: 10.0/10
> 
> **Vorteile**: First of all the Service provided by Threatlocker (In my case \[sensitive content hidden\] who is an excellent engineer - who really took the time to understand our needs and really understands the product). The implementation is always my worry with these types of tools, the implementation has been seamless due to the learning process. Combine \[sensitive content hidden\] on the implementation side with the Cyber Heroes quick response time this is a great end to end product.
> 
> **Nachteile**: Alerting on Threats, this is being really picky. But more specific alerting on threats with embedded information would be great.
> 
> Fantastic, great product. Has increased our Security Posture business wide, has left me feeling so much more confident about the security of our infrastructure \&amp; endpoints.

-----

Page: 1 / 5\
Weiter: [Next page](https://www.capterra.com.de/software/195434/threatlocker-control?page=2)

## Links

- [View on Capterra](https://www.capterra.com.de/software/195434/threatlocker-control)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.capterra.com.de/software/195434/threatlocker-control> |
| de-AT | <https://www.capterra.at/software/195434/threatlocker-control> |
| de-CH | <https://www.capterra.ch/software/195434/threatlocker-control> |
| en | <https://www.capterra.com/p/195434/ThreatLocker-Control/> |
| en-AE | <https://www.capterra.ae/software/195434/threatlocker-control> |
| en-AU | <https://www.capterra.com.au/software/195434/threatlocker-control> |
| en-CA | <https://www.capterra.ca/software/195434/threatlocker-control> |
| en-GB | <https://www.capterra.co.uk/software/195434/threatlocker-control> |
| en-IE | <https://www.capterra.ie/software/195434/threatlocker-control> |
| en-IL | <https://www.capterra.co.il/software/195434/threatlocker-control> |
| en-IN | <https://www.capterra.in/software/195434/threatlocker-control> |
| en-NZ | <https://www.capterra.co.nz/software/195434/threatlocker-control> |
| en-SG | <https://www.capterra.com.sg/software/195434/threatlocker-control> |
| en-ZA | <https://www.capterra.co.za/software/195434/threatlocker-control> |
| es | <https://www.capterra.es/software/195434/threatlocker-control> |
| es-AR | <https://www.capterra.com.ar/software/195434/threatlocker-control> |
| es-CL | <https://www.capterra.cl/software/195434/threatlocker-control> |
| es-CO | <https://www.capterra.co/software/195434/threatlocker-control> |
| es-CR | <https://www.capterra.co.cr/software/195434/threatlocker-control> |
| es-DO | <https://www.capterra.do/software/195434/threatlocker-control> |
| es-EC | <https://www.capterra.ec/software/195434/threatlocker-control> |
| es-MX | <https://www.capterra.mx/software/195434/threatlocker-control> |
| es-PA | <https://www.capterra.com.pa/software/195434/threatlocker-control> |
| es-PE | <https://www.capterra.pe/software/195434/threatlocker-control> |
| fr | <https://www.capterra.fr/software/195434/threatlocker-control> |
| fr-BE | <https://fr.capterra.be/software/195434/threatlocker-control> |
| fr-CA | <https://fr.capterra.ca/software/195434/threatlocker-control> |
| fr-LU | <https://www.capterra.lu/software/195434/threatlocker-control> |
| it | <https://www.capterra.it/software/195434/threatlocker-control> |
| nl | <https://www.capterra.nl/software/195434/threatlocker-control> |
| nl-BE | <https://www.capterra.be/software/195434/threatlocker-control> |
| pl | <https://www.capterra.pl/software/195434/threatlocker-control> |
| pt | <https://www.capterra.com.br/software/195434/threatlocker-control> |
| pt-PT | <https://www.capterra.pt/software/195434/threatlocker-control> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Deutschland","address":{"@type":"PostalAddress","addressLocality":"München","addressRegion":"BY","postalCode":"81829","streetAddress":"Lehrer-Wirth-Str. 2 81829 München Deutschland"},"description":"Capterra Deutschland hilft Millionen von Nutzern die richtige Software für ihr Unternehmen zu finden – Vergleiche Tausende von Bewertungen & Ratings von top Softwareanwendungen.","email":"info@capterra.com.de","url":"https://www.capterra.com.de/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.com.de/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://www.linkedin.com/company/capterra/","https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.youtube.com/channel/UCYjWLCZnOKY90NAS9bFenIQ"]},{"name":"ThreatLocker","description":"Nur nach Bedrohungen zu suchen, reicht für IT-Fachkräfte nicht aus, um Ransomware Einhalt zu gebieten. ThreatLocker hilft dir, deine Angriffsflächen mit richtliniengesteuerter Endpunktsicherheit zu reduzieren. Anstatt nur bekannte Bedrohungen zu blockieren, kann du alles blockieren, was nicht ausdrücklich erlaubt ist. In Kombination mit Ringfencing und zusätzlichen Kontrollen ermöglichst du eine Zero-Trust-Haltung am Endpunkt, um böswillige Angriffe zu blockieren.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/e79bcc66-2ba7-45c1-839f-9f988452f817.png","url":"https://www.capterra.com.de/software/195434/threatlocker-control","@id":"https://www.capterra.com.de/software/195434/threatlocker-control#software","@type":"SoftwareApplication","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.capterra.com.de/#organization"},"aggregateRating":{"@type":"AggregateRating","bestRating":5,"ratingCount":87,"ratingValue":4.9},"offers":{"price":"0.01","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Apple, Windows"},{"@id":"https://www.capterra.com.de/software/195434/threatlocker-control#faqs","@type":"FAQPage","mainEntity":[{"name":"Was ist ThreatLocker?","@type":"Question","acceptedAnswer":{"text":"Nur nach Bedrohungen zu suchen, reicht für IT-Fachkräfte nicht aus, um Ransomware Einhalt zu gebieten. ThreatLocker hilft dir, deine Angriffsflächen mit richtliniengesteuerter Endpunktsicherheit zu reduzieren. Anstatt nur bekannte Bedrohungen zu blockieren, kann du alles blockieren, was nicht ausdrücklich erlaubt ist. In Kombination mit Ringfencing und zusätzlichen Kontrollen ermöglichst du eine Zero-Trust-Haltung am Endpunkt, um böswillige Angriffe zu blockieren.","@type":"Answer"}},{"name":"Wer verwendet ThreatLocker?","@type":"Question","acceptedAnswer":{"text":"Branchen und Unternehmen jeder Größe, die Cybersicherheit mit einer Zero-Trust-Haltung ermöglichen möchten.","@type":"Answer"}}]},{"@id":"https://www.capterra.com.de/software/195434/threatlocker-control#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Startseite","position":1,"item":"/","@type":"ListItem"},{"name":"PAM Software (Privileged Access Management)","position":2,"item":"/directory/31238/privileged-access-management/software","@type":"ListItem"},{"name":"ThreatLocker","position":3,"item":"/software/195434/threatlocker-control","@type":"ListItem"}]}]}
</script>
