Try our new research platform with insights from 80,000+ expert users

Huntress Managed EDR vs ThreatLocker Protect comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Binary Defense MDR
Sponsored
Average Rating
9.2
Reviews Sentiment
7.7
Number of Reviews
16
Ranking in other categories
Managed Detection and Response (MDR) (7th)
Huntress Managed EDR
Average Rating
9.4
Reviews Sentiment
7.8
Number of Reviews
23
Ranking in other categories
Endpoint Detection and Response (EDR) (9th), Managed Detection and Response (MDR) (3rd)
ThreatLocker Protect
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (12th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (6th)
 

Mindshare comparison

Managed Detection and Response (MDR)
Endpoint Protection Platform (EPP)
 

Featured Reviews

Rich Ullom - PeerSpot reviewer
Worth the money, fantastic communication, and fast service with an average response time of about four minutes on an alert
This is my third SOC. I have never had anybody react as well. So, it's hard for me to provide something that they could do better because I'm really happy with them. I just signed another three-year contract with them. I don't find any downside to them, but if I have to put one, it would be consistent manpower or staffing. The only area where the solution can be improved is going to be with people. As they grow, they are struggling with the same thing that every other company is, which is getting talent and getting that talent to stay, but they've just revised their tiering system to go from a flat analyst and manager to a three-tier solution where it goes through two or three before it gets elevated. That seems to have worked out well, so if one level misses it, the next one picks it up, and it works out fine. Consistent staffing is the only challenge they have because when you're hiring level-one analysts, you go through them pretty quickly. You'll probably hire them at 50K or 55K, and after they do it for a year, they find out they can make 85K somewhere else, and they bounce. So, their turnover is a little high, but that's it.
Andy Larin - PeerSpot reviewer
Effortless to use and is one of the easiest products to deploy
Huntress is effortless to use. It's one of the easiest products to deploy. Pushing out through our RMM is simple, and using it is straightforward once it's on a machine. The end user doesn't have to do anything. Everything comes back to us. I love that the alerts are human-curated. They take a look at alerts before we get them. Other products are very noisy. They'll send you an alert about anything. About 95 percent of those alerts go to Huntress first. They check to make sure that it's real and only alert us if it's actionable, something that requires our attention. When I get an alert from Huntress, it must be looked at. I love that. It saves a ton of time for my people. It can fix low-severity threats. Their team is 24/7, whereas my team is not. We want them to take action on known bad things. Sometimes, that means fixing the problem or isolating the machine so multiple machines aren't getting hit. I love that they can address those issues within a very short time.
Roy Richardson - PeerSpot reviewer
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.
report
Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Healthcare Company
8%
Financial Services Firm
7%
Manufacturing Company
7%
Computer Software Company
18%
Manufacturing Company
9%
Insurance Company
8%
Retailer
7%
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Binary Defense MDR?
The most valuable feature is reviewing tickets and the notes added by technicians.
What is your experience regarding pricing and costs for Binary Defense MDR?
It has been good. We have saved money, and we have a better product. We are a company that has become an enterprise f...
What needs improvement with Binary Defense MDR?
We are going to have a meeting with them the following Monday. It will be our first quarterly business review. Half o...
What do you like most about Huntress?
It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since...
What needs improvement with Huntress?
One issue is the managed antivirus. Huntress takes control of the antivirus built into Windows Defender, but it doesn...
What is your primary use case for Huntress?
We roll Huntress out across the board. It's in our base security shield, so we use it everywhere. We also use ThreatL...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuabl...
 

Also Known As

Binary Defense Vision, Binary Defense Managed Detection and Response, Binary Defense Managed Detection & Response
No data available
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

 

Sample Customers

Securitas USA, Black Hills Energy, Lincoln Electric,The J.M. Smuckers Company, New York Community Bank, State of Connecticut, NCR
Information Not Available
Information Not Available
Find out what your peers are saying about Huntress Managed EDR vs. ThreatLocker Protect and other solutions. Updated: October 2024.
823,875 professionals have used our research since 2012.