Try our new research platform with insights from 80,000+ expert users

Huntress vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Huntress
Ranking in Endpoint Protection Platform (EPP)
10th
Average Rating
9.4
Reviews Sentiment
8.0
Number of Reviews
23
Ranking in other categories
Anti-Malware Tools (5th), Endpoint Detection and Response (EDR) (9th), Managed Detection and Response (MDR) (3rd)
ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
13th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
17
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (6th)
 

Mindshare comparison

As of November 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Huntress is 0.9%, up from 0.2% compared to the previous year. The mindshare of ThreatLocker Protect is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Andy Larin - PeerSpot reviewer
Oct 7, 2024
Effortless to use and is one of the easiest products to deploy
Huntress is effortless to use. It's one of the easiest products to deploy. Pushing out through our RMM is simple, and using it is straightforward once it's on a machine. The end user doesn't have to do anything. Everything comes back to us. I love that the alerts are human-curated. They take a look at alerts before we get them. Other products are very noisy. They'll send you an alert about anything. About 95 percent of those alerts go to Huntress first. They check to make sure that it's real and only alert us if it's actionable, something that requires our attention. When I get an alert from Huntress, it must be looked at. I love that. It saves a ton of time for my people. It can fix low-severity threats. Their team is 24/7, whereas my team is not. We want them to take action on known bad things. Sometimes, that means fixing the problem or isolating the machine so multiple machines aren't getting hit. I love that they can address those issues within a very short time.
Roy Richardson - PeerSpot reviewer
Nov 28, 2023
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Huntress helps us replace traditional antivirus solutions with an EDR. I like how easy it is to use and deploy. Support is good- they've responded quickly when I've had issues. I like it a lot so far. It reports valuable information and filters out things I don't need to know."
"Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
"While threat hunting is undoubtedly the most valuable feature, the combination of IP scanning, foothold identification, and canary monitoring has also proven to be incredibly beneficial."
"After deployment, it takes some time to scan and process everything. Huntress has effectively flagged issues such as password files on desktops, which it identifies as low-level alerts. It also handles more significant threats effectively."
"We saw the benefits of Huntress pretty quickly. Once it started detecting threats, it was great."
"Huntress is extremely well-written software. I used to be a developer, and I see how they've written it. It's excellent. I've never had an issue with it crashing a machine. It's small, tight code."
"It catches things that no one else catches. We occasionally have things slip through antivirus and other things, but Huntress catches them. It is awesome as an additional layer of defense on top of other things."
"Huntress helps by highlighting potential issues, allowing us to take proactive measures."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"The application whitelisting feature allows us to block and manage approved applications effectively. It ensures that no one can install an application on our systems unless it is approved by me, which is very efficient."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"Every single feature has been invaluable."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
 

Cons

"The solution's UI is an area with certain shortcomings that need improvement."
"We need an API to automatically retrieve metrics and data about backend activity so we can generate client reports."
"To enhance the platform, I suggest adding a feature to forward Huntress's recommended response directly to the client, ensuring their clear understanding of the gathered information."
"One issue is the managed antivirus. Huntress takes control of the antivirus built into Windows Defender, but it doesn't if, for some reason, Defender isn't working properly and doesn't attempt to fix it. We have to fix it with some scripts so that Defender reports correctly to Huntress. It would be nice if they took that action on our behalf. If they saw a problem with Defender, they should roll out a fix."
"Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."
"Some of Huntress' reporting could be improved."
"The application control system could benefit from improvements in identifying and managing both whitelisted and blacklisted applications."
"The Huntress is not a standalone solution. It really needs to be used with something else such as Microsoft Defender or another antivirus solution. It would be nice to see the product fleshed out by the Huntress team and include the antivirus solution part as well. I want it to be a full-fledged XDR product. It would push the tool to a higher price range but it would be nice to see the fleshed out features. I want them to integrate more features from the XDR realm."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"There are some times when applications get submitted, the hashes don't really line up."
"The support could be quicker."
"ThreatLocker could offer more flexible training, like online or offline classes after hours. The fact that they even provide weekly training makes it seem silly to suggest, but some people can't do it during the day, so they want to train after work. They could also start a podcast about issues they see frequently and what requires attention. A podcast would be helpful to keep us all apprised about what's going on and/or offline training for those people who can't train during the week."
"The reporting could be improved."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
 

Pricing and Cost Advice

"Huntress is an easy sell to clients because it does all the heavy lifting. Sometimes, they will buck a little at the price because they want a free antivirus or EDR. We tell them that we use Huntress on all our machines. That is our standard process for all the machines we roll out. When we give that advice, people are pretty willing to say okay."
"The pricing model for Huntress is similar to competitors and is charged per endpoint."
"It works well for an MSP."
"We haven't had any problems with Huntress' pricing. We're at 250 workstations, and we've grown considerably this year. They've been able to handle everything that we've thrown at them within that time frame. They're also reducing the price based on how many endpoints we add."
"The Huntress pricing is an excellent value for what the product provides."
"The solution is cheap compared to other alternatives. It offers good value for money. For the whole solution, it's up to about five pounds per device per month. Considering what it does, I think that's very good value."
"It is simple. It is reasonable. They raised my prices this year. We never like price increases, but they continue to add value, so we just keep adding agents as we grow and as our clients grow."
"The solution's pricing is fair."
"The pricing is fair and there is no hard sell."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
"The pricing is reasonable and normal. I do not have any problems with the cost."
"The pricing works fine for me. It's very reasonably priced."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Manufacturing Company
9%
Retailer
7%
Healthcare Company
5%
Computer Software Company
37%
Retailer
7%
Government
6%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Huntress?
It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry.
What needs improvement with Huntress?
I had been requesting Huntress support for macOS for a while, and they recently rolled it out, making it generally available within two months. Having a regular support line would be good.
What is your primary use case for Huntress?
It integrates seamlessly with RMM, making it easy to roll out and use. Many fixes are automated, so you can approve them and let the system handle them, avoiding the need to go through individual s...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What needs improvement with ThreatLocker Allowlisting?
I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much. I've found that if a user opens a file from another location, it might trigger an approval process. The same ...
 

Also Known As

No data available
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

Find out what your peers are saying about Huntress vs. ThreatLocker Protect and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.