---
description: Ontdek de plus- en minpunten van ThreatLocker en leer meer over de functies, de prijs en het gebruiksgemak van de software. Lees nuttige beoordelingen van geverifieerde gebruikers en ontdek vergelijkbare programma's.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: ThreatLocker - Bekijk prijzen, reviews en scores - Capterra Nederland 2026
---

Breadcrumb: [Startpagina](/) > [PAM-software (Privileged access management)](/directory/31238/privileged-access-management/software) > [ThreatLocker](/software/195434/threatlocker-control)

# ThreatLocker

Canonical: https://www.capterra.nl/software/195434/threatlocker-control

Page: 1 / 5\
Volgende: [Next page](https://www.capterra.nl/software/195434/threatlocker-control?page=2)

> Stop ransomware met eindpuntcontroles waaronder Allowlisting en Ringfencing voor het inperken van apps.
> 
> Verdict: Rated **4.9/5** by 87 users. Top-rated for **Waarschijnlijkheid van aanbeveling**.

-----

## Overzicht

### Wie gebruikt ThreatLocker?

Industrieën en bedrijven van elke omvang die op zoek zijn naar Zero Trust-cyberbeveiliging.

## Quick Stats & Ratings

| Metric | Score | Detail |
| **In totaal** | **4.9/5** | 87 Reviews |
| Gebruiksgemak | 4.5/5 | Based on overall reviews |
| Klantenondersteuning | 4.9/5 | Based on overall reviews |
| Prijs-kwaliteitverhouding | 4.8/5 | Based on overall reviews |
| Functies | 4.8/5 | Based on overall reviews |
| Recommendation percentage | 90% | (9/10 Waarschijnlijkheid van aanbeveling) |

## Over de leverancier

- **Bedrijf**: ThreatLocker
- **Founded**: 2015

## Commercial Context

- **Beginprijs**: US$ 0,01
- **Prijsmodel**:  (Gratis proef)
- **Target Audience**: 2-10, 11-50, 51-200, 201-500, 501-1.000, 1.001-5.000
- **Deployment & Platforms**: Cloud, SaaS, Web, Mac (desktop), Windows (desktop)
- **Ondersteunde talen**: Engels
- **Available Countries**: Afghanistan, Albanië, Algerije, Amerikaans-Samoa, Amerikaanse Maagdeneilanden, Andorra, Angola, Anguilla, Antigua en Barbuda, Argentinië, Armenië, Aruba, Australië, Azerbeidzjan, Bahama’s, Bahrein, Bangladesh, Barbados, Belarus, België and 206 more

## Functies

- Activiteiten volgen
- Anomalie- en malwaredetectie
- Apparaatbeheer
- Back-up en herstel
- Beheer van problemen
- Beleid opstellen
- Beleidbeheer
- Bewaking
- Configuratiebeheer
- Controle en beheer op afstand
- Doorlopend monitoren
- Dreigingsanalyse
- Endpoint protection
- Firewalls
- Gebeurtenislogboeken
- Gedragsanalyse
- Gegevensbeveiliging
- Netwerkbeveiliging
- Patchbeheer
- Plannen
- Rapportage en analyse
- Reactie op dreigingen
- Real-Time Monitoring
- Risicowaarschuwingen
- Servercontrole
- Toegang en controle op afstand
- Toegangsopties/machtigingen
- Toepassingsbeveiliging
- Toezicht op activiteiten

## Integrations (9 total)

- Auth0
- ConnectWise PSA
- Datto RMM
- HaloPSA
- IT Glue
- Kaseya BMS
- Okta
- ServiceNow
- Splunk Enterprise

## Ondersteuningsopties

- E-mail/helpdesk
- Veelgestelde vragen/forum
- Kennisbank
- Telefonische ondersteuning
- 24/7 (contact met medewerker)
- Chatten

## Categorie

- [PAM-software (Privileged access management)](https://www.capterra.nl/directory/31238/privileged-access-management/software)

## Gerelateerde categorieën

- [PAM-software (Privileged access management)](https://www.capterra.nl/directory/31238/privileged-access-management/software)
- [EDR-software (Endpoint Detection & Response)](https://www.capterra.nl/directory/31695/endpoint-detection-and-response/software)
- [Endpoint protection software](https://www.capterra.nl/directory/30907/endpoint-protection/software)
- [Cyber security tools](https://www.capterra.nl/directory/31037/cybersecurity/software)
- [PC-beveiligingssoftware](https://www.capterra.nl/directory/10005/computer-security/software)

## Alternatieven

1. [N-central](https://www.capterra.nl/software/13803/n-central) — 4.1/5 (195 reviews)
2. [Cove Data Protection](https://www.capterra.nl/software/163343/backup-and-recovery) — 4.7/5 (216 reviews)
3. [N-sight RMM](https://www.capterra.nl/software/163344/n-sight) — 4.3/5 (194 reviews)
4. [ManageEngine OpManager MSP](https://www.capterra.nl/software/212602/manageengine-opmanager-msp) — 4.4/5 (72 reviews)
5. [IT Glue](https://www.capterra.nl/software/170401/itglue) — 4.6/5 (331 reviews)

## Reviews

### "ThreatLocker, the dependable partner." — 5.0/5

> **Craig** | *3 maart 2026* | Informatietechnologie en -diensten | Recommendation rating: 10.0/10
> 
> **Pluspunten**: ThreatLocker is a major partner/vendor of ours, and for good reason; they are dependable and cutting-edge when it comes to their services.
> 
> **Minpunten**: Protection comes at a price, but the premium is worth the investment. They are very responsive and do regular updates.

-----

### "Awesome software with awesome support" — 5.0/5

> **Nathan** | *2 oktober 2024* | Informatietechnologie en -diensten | Recommendation rating: 10.0/10
> 
> **Pluspunten**: As an MSP, ThreatLocker is a major tool in our security stack.  I have used\\tested a lot of security services in the past, but ThreatLocker is the best for the money I have found.  It gives us a large amount of insight and control over devices which makes it hard to pick a favorite part about ThreatLocker.  The product is awesome, but I really want to say my favorite part is the people behind it.  &#10;&#10;You are assigned a Solutions Engineer to help guide you through the process of deployment/configuration.  They are an amazing resource that I have never gotten with any other product.  Usually, software companies just drop you into the portal, show you a few things, then you never hear from them again.  Additionally, the support experience is the best I have ever seen with any software company.  They are very knowledgeable, quick (under 5 minutes), and always available via chat.  The MDR team also helps us have peace of mind that our devices are safe and secured with an action plan we set, even when we are away.
> 
> **Minpunten**: ThreatLocker is a robust solution.  It can be very daunting to get started and comes with a time commitment to learn\\configure.  I could see how some companies could struggle getting through that phase, but it is worth it.

-----

### "Good to be safe." — 5.0/5

> **Camie** | *17 augustus 2025* | Detailhandel | Recommendation rating: 5.0/10
> 
> **Pluspunten**: I like that I my computer software is constantly and consistently being monitored.  I can do my work while it does it’s in the back ground.
> 
> **Minpunten**: Sometimes they are overly cautious or overly sensitive.  But I suppose they know more of what’s out there in the cyber world.
> 
> I’ve had to re ask if I could open a website before because I was unaware that I had to type in a reason.  So my request was just automatically denied but never was told to me it was.  I waited a long time to be able to finish my work.

-----

### "Total Control and Peace of Mind – My Journey with ThreatLocker\!" — 4.0/5

> **Anonymous User** | *12 november 2025* | Logistiek en toeleveringsketen | Recommendation rating: 7.0/10
> 
> **Pluspunten**: I​‍​‌‍​‍‌ have been using ThreatLocker for several months, and it stands out as one of the most powerful cybersecurity tools in my toolkit. Its commitment to a Zero Trust model literally blew my mind. After the installation, I was amazed by how much control I actually had over the allowed applications and scripts on our systems. The whole thing was a total overhaul of how we do endpoint protection.&#10;\* Strong Zero Trust Protection: The “deny by default” strategy implemented by ThreatLocker gives absolute control over the operations of which applications and scripts, thus the likelihood of ransomware and malware attacks is drastically reduced.&#10;\* Powerful Application Allowlisting: The allowlisting capability is highly accurate and efficient — after the completion of the setup, it acts as a security layer that permits software to run only if they are pre-approved, thus providing unbeatable endpoint security.&#10;\* Ringfencing Technology: This technology helps the separation of the different functionalities of an application so that they cannot access data or other programs unless it is necessary, thus preventing lateral attacks and data leaks.&#10;\* Comprehensive Visibility: The control panel provides an accurate and up-to-the-minute picture of what each device is doing, thus facilitating monitoring and auditing ​‍​‌‍​‍‌considerably.
> 
> **Minpunten**: I​‍​‌‍​‍‌ encountered several issues with this platform.&#10;Initial Setup Complexity: The setup was quite overwhelming when I first started using ThreatLocker. While the platform offers a lot of control and customization, it still takes a considerable amount of time to understand and properly configure the policies.&#10;Learning Curve: The product implements a Zero Trust model; hence, it requires some technical background. A new admin or a small team without a dedicated IT staff might find it difficult initially.&#10;Frequent Policy Adjustments: Initially, I had to constantly adjust the settings to allow the legitimate applications, which was somewhat inconvenient until the system got familiar with our ​‍​‌‍​‍‌environment.
> 
> I​‍​‌‍​‍‌ really enjoyed working with ThreatLocker. It is a very effective tool to actually implement the concept of Zero Trust security — giving you full insight and control over what is happening in your environment. Once I got past the initial learning curve, it was really obvious to me how effectively it stops unauthorized applications and possible threats from getting started.&#10;The app's allowlisting and ringfencing functionalities have been a complete turnaround in how I deal with security. I don’t have to worry about new software or ransomware coming in, as everything that is running is what I have definitely ​‍​‌‍​‍‌approved.

-----

### "Amazing Product - Shoutout to \[sensitive content hidden\]" — 5.0/5

> **Kieran** | *3 oktober 2024* | Informatietechnologie en -diensten | Recommendation rating: 10.0/10
> 
> **Pluspunten**: First of all the Service provided by Threatlocker (In my case \[sensitive content hidden\] who is an excellent engineer - who really took the time to understand our needs and really understands the product). The implementation is always my worry with these types of tools, the implementation has been seamless due to the learning process. Combine \[sensitive content hidden\] on the implementation side with the Cyber Heroes quick response time this is a great end to end product.
> 
> **Minpunten**: Alerting on Threats, this is being really picky. But more specific alerting on threats with embedded information would be great.
> 
> Fantastic, great product. Has increased our Security Posture business wide, has left me feeling so much more confident about the security of our infrastructure \&amp; endpoints.

-----

Page: 1 / 5\
Volgende: [Next page](https://www.capterra.nl/software/195434/threatlocker-control?page=2)

## Links

- [View on Capterra](https://www.capterra.nl/software/195434/threatlocker-control)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.capterra.com.de/software/195434/threatlocker-control> |
| de-AT | <https://www.capterra.at/software/195434/threatlocker-control> |
| de-CH | <https://www.capterra.ch/software/195434/threatlocker-control> |
| en | <https://www.capterra.com/p/195434/ThreatLocker-Control/> |
| en-AE | <https://www.capterra.ae/software/195434/threatlocker-control> |
| en-AU | <https://www.capterra.com.au/software/195434/threatlocker-control> |
| en-CA | <https://www.capterra.ca/software/195434/threatlocker-control> |
| en-GB | <https://www.capterra.co.uk/software/195434/threatlocker-control> |
| en-IE | <https://www.capterra.ie/software/195434/threatlocker-control> |
| en-IL | <https://www.capterra.co.il/software/195434/threatlocker-control> |
| en-IN | <https://www.capterra.in/software/195434/threatlocker-control> |
| en-NZ | <https://www.capterra.co.nz/software/195434/threatlocker-control> |
| en-SG | <https://www.capterra.com.sg/software/195434/threatlocker-control> |
| en-ZA | <https://www.capterra.co.za/software/195434/threatlocker-control> |
| es | <https://www.capterra.es/software/195434/threatlocker-control> |
| es-AR | <https://www.capterra.com.ar/software/195434/threatlocker-control> |
| es-CL | <https://www.capterra.cl/software/195434/threatlocker-control> |
| es-CO | <https://www.capterra.co/software/195434/threatlocker-control> |
| es-CR | <https://www.capterra.co.cr/software/195434/threatlocker-control> |
| es-DO | <https://www.capterra.do/software/195434/threatlocker-control> |
| es-EC | <https://www.capterra.ec/software/195434/threatlocker-control> |
| es-MX | <https://www.capterra.mx/software/195434/threatlocker-control> |
| es-PA | <https://www.capterra.com.pa/software/195434/threatlocker-control> |
| es-PE | <https://www.capterra.pe/software/195434/threatlocker-control> |
| fr | <https://www.capterra.fr/software/195434/threatlocker-control> |
| fr-BE | <https://fr.capterra.be/software/195434/threatlocker-control> |
| fr-CA | <https://fr.capterra.ca/software/195434/threatlocker-control> |
| fr-LU | <https://www.capterra.lu/software/195434/threatlocker-control> |
| it | <https://www.capterra.it/software/195434/threatlocker-control> |
| nl | <https://www.capterra.nl/software/195434/threatlocker-control> |
| nl-BE | <https://www.capterra.be/software/195434/threatlocker-control> |
| pl | <https://www.capterra.pl/software/195434/threatlocker-control> |
| pt | <https://www.capterra.com.br/software/195434/threatlocker-control> |
| pt-PT | <https://www.capterra.pt/software/195434/threatlocker-control> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Nederland","address":{"@type":"PostalAddress","addressLocality":"Amsterdam","addressRegion":"NH","postalCode":"1101","streetAddress":"De Entree 79 1101 BH Amsterdam Nederland"},"description":"Capterra Nederland helpt miljoenen mensen om de beste bedrijfssoftware te vinden. Met reviews, scores, infographics en het meest uitgebreide overzicht van bedrijfssoftware.","email":"info@capterra.nl","url":"https://www.capterra.nl/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.nl/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra_NL/","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.youtube.com/channel/UCjbsogwKUrJcUHRpSQvRo6g"]},{"name":"ThreatLocker","description":"Als IT-professionals ransomware willen tegenhouden, moeten ze meer doen dan op zoek gaan naar bedreigingen. Met ThreatLocker verklein je het aanvalsoppervlak met beleidsgestuurde eindpuntbeveiliging. Verander het paradigma van alleen het blokkeren van bekende bedreigingen naar het blokkeren van alles wat niet expliciet is toegestaan. In combinatie met Ringfencing en extra controles schakel je een Zero Trust-positie op het eindpunt in om LotL-aanvallen te blokkeren.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/e79bcc66-2ba7-45c1-839f-9f988452f817.png","url":"https://www.capterra.nl/software/195434/threatlocker-control","@id":"https://www.capterra.nl/software/195434/threatlocker-control#software","@type":"SoftwareApplication","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.capterra.nl/#organization"},"aggregateRating":{"@type":"AggregateRating","bestRating":5,"ratingCount":87,"ratingValue":4.9},"offers":{"price":"0.01","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Apple, Windows"},{"@id":"https://www.capterra.nl/software/195434/threatlocker-control#faqs","@type":"FAQPage","mainEntity":[{"name":"Wat is ThreatLocker?","@type":"Question","acceptedAnswer":{"text":"Als IT-professionals ransomware willen tegenhouden, moeten ze meer doen dan op zoek gaan naar bedreigingen. Met ThreatLocker verklein je het aanvalsoppervlak met beleidsgestuurde eindpuntbeveiliging. Verander het paradigma van alleen het blokkeren van bekende bedreigingen naar het blokkeren van alles wat niet expliciet is toegestaan. In combinatie met Ringfencing en extra controles schakel je een Zero Trust-positie op het eindpunt in om LotL-aanvallen te blokkeren.","@type":"Answer"}},{"name":"Wie gebruikt ThreatLocker?","@type":"Question","acceptedAnswer":{"text":"Industrieën en bedrijven van elke omvang die op zoek zijn naar Zero Trust-cyberbeveiliging.","@type":"Answer"}}]},{"@id":"https://www.capterra.nl/software/195434/threatlocker-control#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Startpagina","position":1,"item":"/","@type":"ListItem"},{"name":"PAM-software (Privileged access management)","position":2,"item":"/directory/31238/privileged-access-management/software","@type":"ListItem"},{"name":"ThreatLocker","position":3,"item":"/software/195434/threatlocker-control","@type":"ListItem"}]}]}
</script>
