We performed a comparison between Fortinet FortiNAC and ThreatLocker Protect based on real PeerSpot user reviews.
Find out in this report how the two Network Access Control (NAC) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The support responds to our queries within two to four hours."
"The features are more expandable."
"It's easy to connect to a VPN without any hassles."
"Version 9.1 has been an improvement on previous versions. It's a good solution for SMB."
"The most valuable feature of Fortinet FortiNAC is compliance, which we can do with the clients and the endpoints on the network."
"The most valuable features of Fortinet FortiNAC are user device management and there are plenty of policies."
"The solution is good at giving a deep dive into each product. It tells you, for example, what is connected to the network. It gives us good reporting tools."
"The users say that FortiNAC is configurable and easy to use."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"I think the network devices need to give more information."
"They need to change or upgrade the technology in the product."
"Admin UI could be better matched and easier to use; it cannot work as a RADIUS server."
"The interface works fine, but it could be better."
"The training documentation needs to be more transparent."
"The reporting capability needs to be improved."
"The reporting can also use improvement."
"The user interface and the product's intuitiveness could be improved."
"More visibility in the built-ins would be nice."
"We identified several areas that we would like to see improved."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"Adding applications to the allowlist can sometimes feel overwhelming."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
Fortinet FortiNAC is ranked 4th in Network Access Control (NAC) with 43 reviews while ThreatLocker Protect is ranked 6th in Network Access Control (NAC) with 13 reviews. Fortinet FortiNAC is rated 7.6, while ThreatLocker Protect is rated 9.2. The top reviewer of Fortinet FortiNAC writes "I like the solution's native integration with other devices from the same vendor". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". Fortinet FortiNAC is most compared with Cisco ISE (Identity Services Engine), Aruba ClearPass, Forescout Platform and Fortinet FortiAuthenticator, whereas ThreatLocker Protect is most compared with SentinelOne Singularity Complete, Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress and Deep Instinct Prevention Platform. See our Fortinet FortiNAC vs. ThreatLocker Protect report.
See our list of best Network Access Control (NAC) vendors.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.