---
description: Compare ThreatLocker vs Cisco Secure Endpoint regarding their features, reviews, pricing, specifications, screenshots & more.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: ThreatLocker vs Cisco Secure Endpoint Comparison
---

Breadcrumb: [Home](/) > [Cybersecurity Software](/directory/4643/cybersecurity/software) > [ThreatLocker \<span\>vs\</span\> Cisco Secure Endpoint](https://www.softwareadvice.com.au/compare/314278/402086/threatlocker/vs/cisco-secure-endpoint)

# Compare ThreatLocker vs Cisco Secure Endpoint

Canonical: https://www.softwareadvice.com.au/compare/314278/402086/threatlocker/vs/cisco-secure-endpoint

> Detailed comparison between ThreatLocker and Cisco Secure Endpoint. Check ratings, reviews, pricing, and features to make the best decision for your business.

-----

## At a Glance

| Metric | ThreatLocker | Cisco Secure Endpoint |
| **Overall rating** | 4.9/5 | 4.6/5 |
| **Total Reviews** | 87 | 14 |
| **Starting Price** | USD 0.01 | - |
| **Free Trial** | Yes | Yes |
| **Free Version** | No | No |
| **Deployment** | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop) | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Windows (On-Premise), Linux (On-Premise) |
| **Support** | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support, 24/7 (Live rep), Chat | Chat |
| **Training** | In Person, Live Online, Webinars, Documentation, Videos | Webinars, Documentation |

## Key features

### ThreatLocker

- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Anomaly/Malware Detection
- Application Security
- Audit Trail
- Data Security
- Device Management
- Endpoint Management
- Endpoint Protection Software
- Monitoring
- Real-Time Monitoring
- Real-Time Reporting
- Remote Monitoring & Management
- Reporting/Analytics
- Server Monitoring
- Third-Party Integrations
- Threat Intelligence
- Threat Response

### Cisco Secure Endpoint

- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Anomaly/Malware Detection
- Application Security
- Audit Trail
- Data Security
- Device Management
- Endpoint Management
- Endpoint Protection Software
- Monitoring
- Real-Time Monitoring
- Real-Time Reporting
- Remote Monitoring & Management
- Reporting/Analytics
- Server Monitoring
- Third-Party Integrations
- Threat Intelligence
- Threat Response

## Links

- [View ThreatLocker Profile](https://www.softwareadvice.com.au/software/314278/threatlocker)
- [View Cisco Secure Endpoint Profile](https://www.softwareadvice.com.au/software/402086/cisco-secure-endpoint)
- [View Original Comparison](https://www.softwareadvice.com.au/compare/314278/402086/threatlocker/vs/cisco-secure-endpoint)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"ThreatLocker vs Cisco Secure Endpoint Comparison","description":"Compare ThreatLocker vs Cisco Secure Endpoint regarding their features, reviews, pricing, specifications, screenshots & more.","url":"https://www.softwareadvice.com.au/compare/314278/402086/threatlocker/vs/cisco-secure-endpoint","about":[{"@id":"https://www.softwareadvice.com.au/software/314278/threatlocker#software"},{"@id":"https://www.softwareadvice.com.au/software/402086/cisco-secure-endpoint#software"}],"breadcrumb":{"@id":"https://www.softwareadvice.com.au/compare/314278/402086/threatlocker/vs/cisco-secure-endpoint#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.com.au/compare/314278/402086/threatlocker/vs/cisco-secure-endpoint#webpage","isPartOf":{"@id":"https://www.softwareadvice.com.au/#website"},"inLanguage":"en-AU","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"}},{"name":"ThreatLocker","description":"Stop ransomware! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlisting with Ringfencing app containment and storage policies to enable a Zero Trust posture and block attacks that live off the land.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/f9498ebb-5057-41ac-9d76-e4eda3c0ba81.png","url":"https://www.softwareadvice.com.au/software/314278/threatlocker","@type":"SoftwareApplication","@id":"https://www.softwareadvice.com.au/software/314278/threatlocker#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.9,"bestRating":5,"ratingCount":87},"offers":{"price":"0.01","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Apple, Windows"},{"name":"Cisco Secure Endpoint","description":"Cisco Secure Endpoint is an advanced malware protection solution that helps enterprises secure emails, web traffic and endpoints. The solution prevents threats at point of entry and continuously tracks files to detect and remove file-less malware, ransomware and all other kinds of intrusions. In addition, Cisco provides security services that helps businesses identify incoming threats from third-party interactions, assess vulnerabilities and create information security programs.\n\n\nCisco Secure Endpoint uses multiple preventive engines with a threat intelligence system to facilitate automated identification and virus blocking. It offers a complete overview and control of servers across multiple platforms such as Windows, Android, iOS, macOS and Linux. Features include malicious activity protection, malware exploit prevention and analysis of new threats via machine-learning, sandboxing and more. Additionally, the application suppresses attacks by separating an infected endpoint and blocking it across platforms and devices.\n\n\nCisco Endpoint integrates with various third-party applications such as Blackpoint SNAP Defense, IBM Resilient, CyberSponse SOAR and IBM BigFix. Pricing is available on request and support is extended via phone, email, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/c76511d2-f680-44bd-b6f5-79aeef866083.jpg","url":"https://www.softwareadvice.com.au/software/402086/cisco-secure-endpoint","@type":"SoftwareApplication","@id":"https://www.softwareadvice.com.au/software/402086/cisco-secure-endpoint#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.6,"bestRating":5,"ratingCount":14},"operatingSystem":"Cloud, Apple, Windows, Windows on premise, Linux on premise"},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cybersecurity Software","position":2,"item":"/directory/4643/cybersecurity/software","@type":"ListItem"},{"name":"ThreatLocker vs Cisco Secure Endpoint","position":3,"item":"https://www.softwareadvice.com.au/compare/314278/402086/threatlocker/vs/cisco-secure-endpoint","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/compare/314278/402086/threatlocker/vs/cisco-secure-endpoint#breadcrumblist"}]}
</script>
