Try our new research platform with insights from 80,000+ expert users

Elastic Security vs Huntress comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Elastic Security
Ranking in Endpoint Detection and Response (EDR)
16th
Average Rating
7.6
Number of Reviews
61
Ranking in other categories
Log Management (5th), Security Information and Event Management (SIEM) (5th), Security Orchestration Automation and Response (SOAR) (6th), Extended Detection and Response (XDR) (8th)
Huntress
Ranking in Endpoint Detection and Response (EDR)
9th
Average Rating
9.4
Reviews Sentiment
8.0
Number of Reviews
23
Ranking in other categories
Endpoint Protection Platform (EPP) (10th), Anti-Malware Tools (5th), Managed Detection and Response (MDR) (3rd)
 

Mindshare comparison

As of November 2024, in the Endpoint Detection and Response (EDR) category, the mindshare of Elastic Security is 2.8%, up from 2.4% compared to the previous year. The mindshare of Huntress is 1.2%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

Gajewski Marek - PeerSpot reviewer
Aug 13, 2024
Provides good anomaly detection and connectivity reporting
I use Elastic Security to aggregate all logs from different devices in one place. It works pretty well and provides one overview of everything The solution's most valuable features are anomaly detection and connectivity reporting. Elastic Security also has many automation capabilities, which can…
Andy Larin - PeerSpot reviewer
Oct 7, 2024
Effortless to use and is one of the easiest products to deploy
Huntress is effortless to use. It's one of the easiest products to deploy. Pushing out through our RMM is simple, and using it is straightforward once it's on a machine. The end user doesn't have to do anything. Everything comes back to us. I love that the alerts are human-curated. They take a look at alerts before we get them. Other products are very noisy. They'll send you an alert about anything. About 95 percent of those alerts go to Huntress first. They check to make sure that it's real and only alert us if it's actionable, something that requires our attention. When I get an alert from Huntress, it must be looked at. I love that. It saves a ton of time for my people. It can fix low-severity threats. Their team is 24/7, whereas my team is not. We want them to take action on known bad things. Sometimes, that means fixing the problem or isolating the machine so multiple machines aren't getting hit. I love that they can address those issues within a very short time.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution's most valuable features are anomaly detection and connectivity reporting."
"The cost is reasonable. It's not overly pricey."
"I like that it's a SIEM platform. I like that I can sell Elastic Security quickly. Elastic Security has a large community that can support users."
"It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten."
"The solution is quite stable. The performance has been good."
"The most valuable feature is the machine learning capability."
"The stability of the solution is good."
"It is the best open-source product for people working in SO, managing and analyzing logs."
"The EDR tools are the most beneficial. We protect all our clients' endpoints through their security operation center, which runs through the EDR. We like that it's a small installation that doesn't take up much processing space, and we can quickly install it on our machines. We push out the agents automatically and get everybody up and running quickly."
"We don’t have the required staff to watch the issues that are happening. It is good to have a team from Huntress who can watch the logs 24/7. The tool’s automatic remediation is also fantastic. The solution’s interface is also nice and easy to use. The Huntress team saves us time by going through the issues."
"It catches things that no one else catches. We occasionally have things slip through antivirus and other things, but Huntress catches them. It is awesome as an additional layer of defense on top of other things."
"Huntress' best feature is the threat-hunting expertise that is part of their 24/7 SOC."
"The features of Huntress that I found helpful are the one-click remediation piece and the ability for me to reach out to their customer service reps and get this under control when there is a threat."
"Scalability-wise, I rate the solution a ten out of ten...I rate the technical support a ten out of ten."
"The EDR product is simple to install. It is low maintenance. All the alerts go to Huntress first, and their analyst team reviews them and sends actionable things our way."
"Huntress is easy to use. It immediately improved visibility and understanding of our security posture."
 

Cons

"This solution is very hard to implement."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"The solution does not have a UI and this is one of the reasons we are looking for another solution."
"We are paying dearly for the guy who is working on the ELK Stack. That knowledge is quite rare and hard to come by. For difficulty and availability of resources, I would rate it a five out of 10."
"Elastic has one problem. In the past, Elastic Security was free. Now, they currently only offer the basic license or a certain period of time."
"Improvements in Elastic Security could include refining and normalizing queries to make them more user-friendly, enhancing the user experience with better documentation, and addressing any latency issues."
"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"Elastic Security can be a bit difficult to use if a person only has experience in SMBs with tools like Zoho. The product can also be difficult for those who have never dealt with query language."
"The integration with our RMM could be better."
"We need an API to automatically retrieve metrics and data about backend activity so we can generate client reports."
"I'd like Huntress to implement a component that can analyze network traffic for specific sites."
"Not every time, but sometimes when we click on the remediation, the auto-resolution of the alert, the screen gets stuck, and I need to contact support so they can confirm the remediation was applied, and they have to close the ticket."
"I would like the API to be a little better. They are getting there."
"I had been requesting Huntress support for macOS for a while, and they recently rolled it out, making it generally available within two months. Having a regular support line would be good."
"I'd like it if Huntress could scan for software that's out of date or has open vulnerabilities. That would be useful for us. Scanning for vulnerable software would be helpful. Also, we've set it up to create a ticket in our ticketing system when there's an alert. It would be nice if closing that ticket would also close the Huntress alert. It doesn't do that right now, but they're working on adding that feature."
"The Huntress is not a standalone solution. It really needs to be used with something else such as Microsoft Defender or another antivirus solution. It would be nice to see the product fleshed out by the Huntress team and include the antivirus solution part as well. I want it to be a full-fledged XDR product. It would push the tool to a higher price range but it would be nice to see the fleshed out features. I want them to integrate more features from the XDR realm."
 

Pricing and Cost Advice

"Compared to other tools, Elastic Security is a cheaper solution."
"The solution is free."
"The tool's pricing is flexible and comes at unit cost. You don't have to pay for everything."
"We are using the free, open-source version of this solution."
"The pricing is in the middle. I think it is not an expensive experience if we compare it with big names, for example, QRadar, and also Oxide. I think Elastic Security is quite cheap. I would rate the pricing of this solution a five out of ten."
"The base product is open-source but if you need advanced security features then you need to pay for the subscription. Elastic Security's price is reasonable in some cases and in other cases it's not."
"There is no charge for using the open-source version."
"We use the open-source version, so there is no charge for this solution."
"The pricing is competitive, in line with Huntress's offerings, and aligns well with our business model."
"It is fair. They provide good value for the product that they deliver. I have had one price increase in the entire time I have used them. They added a bunch of features and then said that they have to increase our price a little bit. That is a fair way to handle it."
"It is simple. It is reasonable. They raised my prices this year. We never like price increases, but they continue to add value, so we just keep adding agents as we grow and as our clients grow."
"I rate the product pricing six out of ten for the Malaysian market. However, I would rate it a three out of ten for the Australian, New Zealand, or Singapore markets."
"Huntress is priced fairly for the services and value it provides."
"Huntress is an easy sell to clients because it does all the heavy lifting. Sometimes, they will buck a little at the price because they want a free antivirus or EDR. We tell them that we use Huntress on all our machines. That is our standard process for all the machines we roll out. When we give that advice, people are pretty willing to say okay."
"While other options have emerged since Huntress' arrival, I believe it still offers the best value for the features and services it provides."
"The pricing model for Huntress is similar to competitors and is charged per endpoint."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
814,763 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
10%
Government
10%
University
7%
Computer Software Company
19%
Manufacturing Company
9%
Retailer
7%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
Compared to other tools, Elastic Security is a cheaper solution.
What do you like most about Huntress?
It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry.
What needs improvement with Huntress?
I had been requesting Huntress support for macOS for a while, and they recently rolled it out, making it generally available within two months. Having a regular support line would be good.
What is your primary use case for Huntress?
It integrates seamlessly with RMM, making it easy to roll out and use. Many fixes are automated, so you can approve them and let the system handle them, avoiding the need to go through individual s...
 

Also Known As

Elastic SIEM, ELK Logstash
No data available
 

Learn More

 

Overview

 

Sample Customers

Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Information Not Available
Find out what your peers are saying about Elastic Security vs. Huntress and other solutions. Updated: October 2024.
814,763 professionals have used our research since 2012.