Try our new research platform with insights from 80,000+ expert users
Timothy Breen - PeerSpot reviewer
Help Desk Engineer at Panurgy
MSP
It is affordable, powerful, and saves costs
Pros and Cons
  • "The most valuable aspect of Huntress is its ability to isolate legacy systems from the network, preventing the spread of threats."
  • "Ultimately, the clarity of their alerts is paramount for effective threat communication and could benefit from clearer remediation steps."

What is our primary use case?

Huntress is one of our security layers. We also use Webroot for antivirus and SentinelOne. Huntress is particularly valuable because when we first implemented it, we discovered several potential issues with our PCs that we were able to address quickly. More recently, it has allowed us to be notified immediately if something bad is happening.

We implemented Huntress to improve our security posture.

How has it helped my organization?

Last weekend, we experienced a potential breach prevented by Huntress' automated response. It involved the general manager at a car dealership who was unaware of an ongoing penetration test. This caused confusion until we contacted someone knowledgeable about the situation, allowing us to restore normalcy. This incident highlights the potential for serious consequences had the breach not been prevented.

Huntress is easy to use. The portal is transparent, and the manual or automatic remediation recommendations are well-defined.

It is a valuable addition to the SMB market. It is affordable and powerful.

Since we started using Huntress, things have become more automated. One valuable feature they recently introduced is a test mode, which allows us to gauge our response to a simulated emergency without triggering an actual alert.

Huntress' 24/7 monitoring is helpful. While it will alert us at all times, the alerts are usually important. The only low priority item is password alerting. When Huntress finds files that might have clear text passwords, it's not a high risk, but it's still good to inform the client about potential security issues.

The auto-remediation capabilities are excellent because they allow for a set it and forget it approach, or users can simply revisit the portal to verify that everything is as expected.

Huntress has helped reduce the need for expensive security tools and the hiring of security analysts. This can lead to savings equivalent to the cost of two security analysts, which is approximately $200,000 per year.

Huntress has improved our security. It generally doesn't interfere with our other tools, as sometimes our antivirus or some of the other tools tend to flag legitimate activities.

We have integrated Huntress with Webroot and SentinelOne. They each play a role in the security posture.

We noticed an improvement in our security within a few weeks. Of course, there were many things to handle, especially when rolling it out at a new location. We tend to clean up a little bit initially, which increases our workload slightly. But once we get through that initial phase, everything runs smoothly.

Huntress has saved us 20 percent in resources.

What is most valuable?

The most valuable aspect of Huntress is its ability to isolate legacy systems from the network, preventing the spread of threats. The automated remediation feature also provides significant value.

What needs improvement?

Huntress excels at explaining threats when they are presented in clear language. However, the sheer volume of threats and occasional ambiguity in remediation steps can make comprehensive tracking challenging. Ultimately, the clarity of their alerts is paramount for effective threat communication and could benefit from clearer remediation steps.

Buyer's Guide
Huntress Managed EDR
February 2025
Learn what your peers think about Huntress Managed EDR. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Huntress for four years.

What do I think about the stability of the solution?

I would rate the stability of Huntress nine out of ten.

What do I think about the scalability of the solution?

I would rate the scalability of Huntress eight out of ten.

How was the initial setup?

The initial deployment was done using a script, taking one day. We integrate it with ConnectWise to push scripts out to PCs and monitor the deployment to ensure continuous operation and services running. We receive alerts for this, making it maintenance-heavy but ultimately worthwhile.

Our deployment strategy was straightforward: set up the company, then implement and activate the scripts. I'm not heavily involved in deployments, but I've written a few scripts. When issues arise, like when our tool ThreatLocker halts a deployment, I step in to troubleshoot and resolve the problem.

What was our ROI?

Any prevention or early detection of an attack, like catching a cold before it spreads, will lead to significant savings in time, investment, and reputation. If we, as the Managed Service Provider, experience an exploit, it will negatively impact our reputation. Therefore, safeguarding our reputation is the best form of seeing a return on investment.

What other advice do I have?

I would rate Huntress nine out of ten. The services tend to stop, so we have a small script that restarts them. I don't know if there's a way they can make their service more resilient. That would reduce our maintenance burden.

We have 20 people that use Huntress in our organization.

We use Huntress on almost 25,000 devices.

Huntress requires minimal maintenance.

I would recommend Huntress to others. It lets you know about real-world attacks happening in near real-time. A couple of years ago, I remember Huntress alerted us about a laptop stolen at an airport, and we were able to isolate that laptop. It was eventually returned to the company, and they just had to call us to let us know. You can also turn off isolation, so it's not just a security feature, but it's almost like having LoJack for your laptop.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: MSP
Flag as inappropriate
PeerSpot user
David Markley - PeerSpot reviewer
President at STRONGHOLD DATA, LLC
MSP
Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture
Pros and Cons
  • "Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
  • "I'd like Huntress to implement a component that can analyze network traffic for specific sites."

What is our primary use case?

Over the years, Huntress has gained many features, but initially, it was the foothold detection that drew us to the solution. It excels at uncovering persistent threats that evade other security measures. Our staff often compares it to a baseball backstop: you might not hit every pitch, and the catcher might miss a ball, but the backstop is there to prevent a disaster. In the same way, Huntress acts as a safety net, a team of experts searching for threats that slip past other security layers.

We observed threat actors continually refining their attack methods against the managed endpoints of our diverse clientele. We sought a security tool that avoided exaggerated claims of absolute protection. We understand that perfect security doesn't exist. Instead, we prioritized finding a partner with integrity and a genuine commitment to the SMB security mission, both for our clients and the broader community. Even before becoming an investor and customer, Huntress impressed us with their educational approach. They actively engage the MSP community, providing valuable knowledge, training, and insights into current threats. Their focus on raising security awareness before securing contracts resonated deeply with us. We admire their company culture and approach.

Our client base presents a mixed deployment landscape. Some, particularly those in manufacturing, maintain significant on-premises infrastructure. In contrast, others have fully embraced the cloud and haven't adopted serverless technologies like the ones we offer. Therefore, our platform must cater to this diverse range of deployment models.

How has it helped my organization?

Huntress was likely the easiest tool we've ever deployed. It's low-touch, and we didn't anticipate any problems. The worst-case scenario would be an issue with their internet connection, but otherwise, it requires minimal interaction with the machines. Users are unaware of its background operation; it doesn't make changes or enforce rules initially, making the rollout very smooth. We even deployed it internally before broader implementation to familiarize ourselves and ensure it wouldn't cause any harm. My confidence stemmed from its ease of use and the high quality of its product.

It is a cost-effective solution for the SMB market. It allows us to keep our costs competitive while ensuring optimal protection for our clients. Additionally, it instills a sense of quality and reliability in our operations. After all, we are human, and mistakes are inevitable. Huntress provides peace of mind for the MSP side by helping us mitigate those potential oversights.

We observed the benefits of Huntress within the first two weeks of deployment. We discovered several previously unknown aspects of the managed environment. Subsequently, after implementing the change to simply push them out of their base stack, we were able to quickly identify well-responding machines, those requiring attention, and malfunctioning Wi-Fi protection. This process effectively illuminated areas requiring improvement from a management perspective.

The fact that the Huntress system is managed 24/7/365 is extremely helpful for our workloads. Our staff typically works from seven in the morning to five in the afternoon, so there's only a small overlap with Huntress' coverage. However, we greatly benefit from them keeping an eye on things and being able to alert us in the middle of the night if something suspicious happens. We're very thankful for their round-the-clock monitoring, as it saves us from having to keep our staff up late or hire additional workers for overnight hours. This, in turn, saves us money on labor costs.

There’s a feature that allows us to automatically remediate low-severity threats, and we have enabled it for certain clients. This feature has significantly reduced the number of minor issues that our SOC team would usually deal with, freeing them to focus on higher-level threats and more strategic tasks.

Huntress has significantly improved our security posture. Their team provides exceptional vigilance, staying informed about emerging threats and tracking the tactics of bad actors. We've seen numerous instances where they've detected threats just as they activated. In some cases, we simply isolated the affected machine, while in others it didn't require such immediate action. Remarkably, a month later, the FBI contacted us to inquire about one of these potential threats. Fortunately, thanks to Huntress' swift intervention, there was no actual danger. This experience highlights their cutting-edge expertise, not just in technology, but also in understanding the evolving tactics of cybercriminals. They consistently stay ahead of the curve, or at least keep pace with, the ever-changing threat landscape.

Huntress helps to reduce the need for expensive security tools and analysts. We have a superior base layer compared to just offering a standalone product. While it is a tool, it's also a product and service that includes access to the Huntress team's expertise. Their threat operations team monitors potential threats, so we don't need to dedicate our own time and resources to analyzing logs and information. They essentially do it for us.

Finding cost-effective security partners is crucial, as we navigate competing demands. Some clients expect high effectiveness and demonstrably high value, while other vendor tools see rising costs. It's key to identify partners who deliver demonstrably good value for our investment, maximizing our effectiveness through optimized time and resource allocation.

We begin to see improvements in our company's security within two days of deployment. Pushing the installation requires minimal effort. Typically, suspicious activity becomes apparent within the first 24 to 48 hours, which the system highlights immediately. After a week or two, the system learns usage patterns and adapts to the environment, providing us with a comprehensive understanding of our security posture. By then, we've proactively addressed any identified issues, resulting in a swift and efficient security monitoring process.


What is most valuable?

Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients. However, what truly convinced us to make it a core part of our security stack, instead of just deploying it selectively based on specific needs, was Huntress' introduction of Managed AV. This allowed us to replace our basic antivirus solution often Windows Defender for our predominantly Windows environment with a more robust option managed by Huntress. Managed AV essentially made Huntress our new baseline antivirus, replacing Windows Defender, while still allowing us to utilize premium solutions like SentinelOne for specific situations. Ultimately, this shift enabled us to expand our footprint from around 400-500 machines to an impressive 4,600.

What needs improvement?

I'd like Huntress to implement a component that can analyze network traffic for specific sites. This involves deploying network sensors that monitor beyond just endpoint data, which they currently gather, and identity information through their 365 integration. This additional layer would offer site-level visibility, allowing us to detect suspicious traffic even on devices where the Huntress endpoint agent can't be installed. For example, in manufacturing environments, network devices and IoT devices might not be compatible with the agent. Comprehensive site-wide visibility would significantly enhance our security posture.

For how long have I used the solution?

I have been using Huntress for around four years.

What do I think about the stability of the solution?

Huntress is stable. We have not encountered any issues.

What do I think about the scalability of the solution?

Easy scalability that requires minimal time investment from us. Their platform readily handles our needs.

How are customer service and support?

We've been using their service for years now with minimal technical issues. However, I've contacted their technical support several times, usually regarding security-related alerts. In some cases, it was a matter of needing clarification, while other times we simply couldn't find the relevant documentation. We wanted additional information about these alerts to improve our understanding and prevent future issues. Sometimes they get busy and their response time is slow but the quality of their service is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, we used a variety of security solutions, but none specifically addressed the gap where users require items to be forwarded to other security layers. We solely relied on antivirus software or various EDR solutions at the time. We simply made the most of those tools available. Huntress did replace antivirus programs like Bitdefender and Webroot for us. Because we could utilize Managed AV, we no longer needed those other products. In that sense, it did take their place. However, Huntress entered the market to fill a previously unmet need and created a new market segment.

How was the initial setup?

The initial deployment was smooth, even when we encountered some misalignments between our expectations and reality, or when we had to adjust initial assumptions. Fortunately, we were able to rectify these issues quickly by modifying the agents. For example, if an agent was assigned to the wrong client, we could make a prompt correction.

Overall, the deployment was very straightforward thanks to the ease of using PowerShell. The developers did a fantastic job making the process as user-friendly as possible.

One person was required for the deployment.

What about the implementation team?

We handled the deployment internally, leveraging our existing RMM tool which already manages and deploys other software.

What was our ROI?

Huntress boasts a high return on investment. This translates to needing fewer staff dedicated to analyzing security tools, which is a significant benefit for us. Consequently, labor costs associated with incident monitoring decrease. Additionally, it provides a dedicated Security Operations Center team that continuously monitors for threats. Essentially, it's like getting two solutions for the price of one. I imagine the reduction in personnel costs would at least cover half the expense of incident investigation and response, which are typically more costly with other solutions. Overall, the ROI from Huntress is evident in our daily operations. The peace of mind and improved sleep Huntress brings are invaluable.

What's my experience with pricing, setup cost, and licensing?

While other options have emerged since Huntress' arrival, I believe it still offers the best value for the features and services it provides.

Which other solutions did I evaluate?

Many alternative security solutions originated from the enterprise market, resulting in high pricing that didn't fit our MSP pricing model for smaller clients. Additionally, while existing antivirus vendors offered bolted-on MSP options, standalone SOC services often lacked cost-effective models per endpoint. At the time, nothing quite like Huntress existed in the market.

What other advice do I have?

I would rate Huntress ten out of ten.

Huntress is doing exactly what we need. However, we haven't fully explored its potential for expansion. Previously, my main request was Microsoft 365 integration, which they are now working on. We're currently conducting some early pilot tests with it. In essence, that integration addressed the major gap I identified.

Most multi-tenant tools involve a dashboard, user interface, and the ability to create sub-organizations or child accounts. Each child account has access to all purchased products under its parent account. The key requirement is ensuring machines are accurately tagged to their respective companies. While infrequent, maintaining these tags involves verifying their correctness and fixing minor issues, such as typos or inconsistencies. This applies to most multi-tenant tools, not specific to Huntress. However, Huntress simplifies this process compared to other solutions. Unlike requiring uninstallation or redeployment in other tools, Huntress allows seamless correction and movement of tagged machines, minimizing errors and streamlining management.

As long as we understand the platform's capabilities and the value it provides, we can avoid any misconceptions. I believe many MSPs tend to get overly excited about any new tool. We've faced similar challenges in the past, so it's crucial to remember that this isn't a "deploy and forget" solution. While the platform simplifies the process significantly, some effort is still required on our end to ensure proper configuration before deployment. It's more of a "set it and manage" tool compared to the others we use. Therefore, understanding the product, its position in our security stack, and how it complements existing tools is essential. We need to know how to explain its role and support it effectively for our clients. That's the key takeaway. Knowing its place in the security stack is fundamental.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
PeerSpot user
Buyer's Guide
Huntress Managed EDR
February 2025
Learn what your peers think about Huntress Managed EDR. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Jim Bolinski - PeerSpot reviewer
President at Abbas Networking Services
Real User
Top 10
Has a manned security operation center, not AI-driven
Pros and Cons
  • "The solution's most valuable feature is that it has a manned security operation center, not AI-driven."
  • "Huntress should have a more user-friendly interface because it takes some understanding to work our way through the interfaces."

What is our primary use case?

We're a managed service provider, and we install Huntress on our clients' computers to keep them safe.

What is most valuable?

The solution's most valuable feature is that it has a manned security operation center, not AI-driven.

It is quite easy to use Huntress.

I think Huntress is a very solid solution. It is a top-of-the-tier, cutting-edge tool that can find things others can't.

We started to see the benefits of Huntress immediately after deploying it. I had been using another security vendor. For the first couple of days after deploying Huntress, we had numerous alerts about problems on people's systems, and we were able to address them.

The fact that the solution is fully managed by Huntress 24/7 has definitely reduced the amount of noise alerts we get. When something actually gets to us, it is definitely actionable.

Huntress' ability to automatically remediate low-severity threats has worked very well in our instances. I feel it has increased our security posture. It's just one component of our security stack, but it has definitely elevated our security stack.

The solution has reduced our overall costs by combining security tools into its platform, which is very important to us.

Huntress has significantly elevated our organization's overall security posture.

We combined Huntress with Microsoft Defender and Webroot DNS, and it works quite well.

Huntress is far superior to other solutions when it comes to providing proactive protection against threats. SentinelOne lets viruses through, while Huntress does not. The Norton product has a really high processor load. It's archaic how they design their product. However, operating the Norton or Symantec tool takes up a lot of processor resources.

The way the Huntress SOC team works with us is far superior compared to the SOC teams of those other solutions. They are very responsive and respond within minutes, while others take days.

What needs improvement?

Huntress should have a more user-friendly interface because it takes some understanding to work our way through the interfaces. When you log in to the portal, there are many different categories to investigate. It would be good if the solution had a central alerts page to go to first rather than checking into all the categories to see if something needed to be addressed.

For how long have I used the solution?

I have been using Huntress for two years.

What do I think about the stability of the solution?

We haven’t faced any issues with the solution’s stability.

What do I think about the scalability of the solution?

The product is easy to deploy and doesn't really have any limitations related to scalability that I know of.

How are customer service and support?

The technical support team provides very speedy answers and always gets right to the point. They understand the problem and direct you to the right areas.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Webroot SecureAnywhere and found that Huntress picked up things that Webroot allowed.

How was the initial setup?

The solution's initial setup was not especially difficult, but it was also not easy. One person deployed the solution within three days.

What's my experience with pricing, setup cost, and licensing?

The solution's pricing is fair. I like that Huntress monitors for units that are no longer checking in and automatically removes them so that you don't get billed. Huntress is 5% to 10% more expensive than other tools we've evaluated.

Which other solutions did I evaluate?

Before choosing Huntress, we evaluated three other tools, including Norton Security and SentinelOne. The other tools did not pass our virus tests. When we created virtual environments and attacked them with viruses, both tools let the viruses get through.

What other advice do I have?

We have an API that we build into our managed service platform, which we just install from the script. Huntress does not necessarily require any maintenance. You have actionable items that will occur in the use of the product, but it's a set-it-and-forget-it installation.

New users should ensure that their use case fits into the Huntress model. We investigated and found that our MM was compatible with Huntress, and it was a pretty smooth integration. I don't know whether all our MMs are as adept, but ours worked well.

Overall, I rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: MSP
Flag as inappropriate
PeerSpot user
reviewer2344506 - PeerSpot reviewer
Chief Security Officer at a computer software company with 51-200 employees
MSP
A great option for the SMB market, enhances visibility into endpoint activity, and reduces the effort needed for handling alerts
Pros and Cons
  • "The most valuable aspect of Huntress is its 24/7 SOC service."
  • "Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."

What is our primary use case?

We use Huntress to monitor our internal and customer systems for security vulnerabilities.

We chose Huntress for its 24/7 managed detection and response services.

Huntress is deployed entirely in the cloud. We use the Huntress portal to manage it and our RMM tool to distribute the agent to our devices.

How has it helped my organization?

Huntress is a great option for the SMB market. It's competitively priced and offers good value for the money, making it one of the most cost-effective security solutions available. Its team is highly qualified and delivers a quality product at a price point that fits the SMB budget. Enterprise tools can often be overly complex or expensive, and Huntress effectively addresses both of these concerns.

It's extremely easy overall. We deploy the agent and it takes care of the rest.

Huntress enhances visibility into endpoint activity by monitoring running processes. It employs a 24/7 human response team to analyze alerts from both the Huntress agent and Windows Defender Endpoint Protection. This team can then choose to isolate suspicious activity and limit its impact if deemed malicious, or escalate the case for further investigation.

Some endpoint protection solutions may miss early warning signs of suspicious activity, such as unusual system behavior or potential footholds for attackers. This is often the case when deploying such solutions to new customers. However, it's important to remember that malicious activity doesn't happen every day in every environment. So, for some customers, its value might not be immediately apparent. It might take a few years before a serious incident occurs, highlighting the need for Huntress' detection and response capabilities. Therefore, the timeframe to see the benefits of Huntress can vary greatly.

The fully managed service has certainly reduced the effort needed for handling alerts from endpoint protection solutions like Windows Defender. Eliminating the need to deal with false positives has been a significant benefit, greatly reducing our team's workload. Additionally, the SOC within the service effectively handles after-hours issues, minimizing the impact on our on-call staff.

Instead of relying on expensive endpoint protection software, we successfully leveraged the built-in Windows Defender in conjunction with the Huntress agent. This combination, in our opinion, represents a significant improvement over using a potentially more robust but costly solution alone. The key advantage lies in the added human element: Huntress' 24/7 monitoring and endpoint isolation capabilities. This approach has demonstrably improved our security posture. However, it's unclear whether it fully eliminates the need for a high-cost security analyst. While Huntress certainly reduces expenses associated with lower-level resources tasked with the initial triage of false positive alerts, its impact on the role of a specialized security analyst remains to be determined.

It has improved our overall security significantly. It adds another valuable layer of protection and provides greater visibility into endpoint activity. Perhaps the most significant benefit for us is the true 24/7 coverage. While our staff has extended hours, there's a gap overnight when no one is actively monitoring for security incidents. When time is of the essence, as it often is in cyber situations, having someone from Huntress available to instantly respond by isolating threats is invaluable. This service is certainly more cost-effective than attempting to staff our team for round-the-clock coverage.

Our security started improving immediately after deployment. It began searching for pre-existing footholds or remnants of other malware that may not have been fully cleaned up from previous infections. The 24/7 SOC provided instant benefits—knowing we had that extra layer of protection with dedicated experts watching our systems was a reassuring feeling.

What is most valuable?

The most valuable aspect of Huntress is its 24/7 SOC service. If something suspicious is seen on an endpoint, even in the middle of the night, there is always someone available to react quickly and isolate the endpoint to mitigate the potential spread to others. 

What needs improvement?

Huntress' Process Insights feature could benefit from more robust search and filtering capabilities. Currently, it's quite basic, offering only a single search bar with limited granularity. Additionally, the data retention period is short, with access restricted to three days. While the SOC team can export a week's worth of data, extending this period to at least thirty days would be highly beneficial.

Overall, we're generally satisfied with the solution. However, deeper integration with other endpoint protection platforms would be valuable. Ideally, Huntress should be able to ingest alerts from systems like CrowdStrike and conduct investigations similar to CrowdStrike's offerings. This would be particularly useful for us as a CrowdStrike partner.

For how long have I used the solution?

I have been using Huntress for three years.

What do I think about the stability of the solution?

Last week, we encountered an issue with the Huntress agent. Essentially, there are two components: the core Huntress agent and the Rio agent, added later about a year into our partnership for process insights. While Rio is valuable, we experienced a communication gap regarding its functionality.

If Rio shut down for any reason e.g., computer reboot, or agent update, it wouldn't restart properly, creating a blind spot for the Hunter team as no data was transmitted. This issue emerged within the past two weeks and took a few days for Huntress to identify and resolve.

Overall, the platform is generally stable, but we've faced some bumps in the road. One issue involved unclear communication about agent check-ins, and the other was the recent Rio shutdown problem.

What do I think about the scalability of the solution?

Huntress scales very well. We've grown from approximately 9,000 to 17,000 endpoints, and I haven't encountered any scalability issues.

How are customer service and support?

We're generally very pleased with the technical support. They respond promptly via chat, and if the frontline team can't resolve an issue, they escalate it swiftly. In one instance, their SOC analysts even helped us investigate malicious activity at our endpoints, something that deeply concerned us and our customers. In that situation, they truly went above and beyond to assist us.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Webroot, but it was ineffective at stopping the latest ransomware threats. That was the main reason we switched to Huntress. We replaced Webroot with the built-in Windows Defender plus the Huntress agent, and together they proved significantly more effective at stopping those threats than Webroot alone.

How was the initial setup?

The initial deployment was smooth. However, we realized a gap in our internal processes and understanding of how to respond to different alert levels.

Our deployment was rushed due to signing the agreement during the Log4J vulnerability outbreak around Christmas 2020. The widespread threat forced us to prioritize deploying the Huntress agent quickly instead of following a slower, more deliberate approach to replacing Webroot.

Fortunately, the Huntress agent seamlessly integrates with other endpoint protection solutions. This allowed deployment without disrupting existing protection or leaving us vulnerable during the transition.

The additional 24/7 SOC visibility without replacing our current endpoint protection has been immensely valuable. While deployment was simple, we identified the need to refine internal processes and response protocols for different alert levels.

We had a small team, perhaps two or three people, working on the deployment. In all honesty, it could have been done by a single person. Our deployment process is streamlined, and we have a large customer base. As a mid-sized MSP with over two hundred customers at the time, we had the manpower to spare. However, thanks to scripting and RMM tools, even a single individual could theoretically deploy Huntress to a large number of endpoints with ease.

What about the implementation team?

Being an MSP, we implemented the solution internally.

What's my experience with pricing, setup cost, and licensing?

Huntress is priced fairly for the services and value it provides.

What other advice do I have?

I would rate Huntress nine out of ten.

Our team occasionally uses the automatic remediation feature for low-severity threats, but we don't heavily rely on it. When it comes to endpoint protection alerts, we prefer a more hands-on approach. Despite using automatic remediation to some extent, the feature's impact on our workload has been minimal.

The biggest maintenance challenge with Huntress is the potential for certain firewalls, especially Fortinet models depending on their enabled features, to block communication from the agent on the endpoint back to the Huntress portal. This blockage isn't apparent from the endpoint itself. While the Huntress page might appear installed and running, the agent might have only checked in initially and stopped sending data. After a month of inactivity, Huntress removes the agent to prevent the portal from becoming overloaded with inactive agents. This creates blind spots in our monitoring, as we remain unaware of the missing data. Addressing this challenge has been difficult, as we rely on our RMM tool for endpoint management and strive to maintain a consistent active list. Continuously comparing this list with the Huntress portal to ensure they match has proven frustrating.

When using Huntress the most crucial aspect is training our internal staff on how to respond to different alert levels. These levels typically fall into three categories: low, high, and critical. It's essential to have a clear action plan or standard operating procedure outlining how our team should handle each alert type. Additionally, basic training on the Huntress portal is recommended. The portal has various pages, modules, and tabs, so familiarizing our staff with navigating and interacting with it is crucial. This includes skills like isolating endpoints, removing isolation if necessary, and utilizing provided remediation tasks or manual remediation if preferred. Implementing these measures will significantly improve our incident response capability.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP
PeerSpot user
Senior Systems Engineer at NetSmart, Inc.
Reseller
Provides responsive support and efficient threat resolution
Pros and Cons
  • "Their SOC is super responsive and does a great job of catching incidences and being on top of any issues that arise."
  • "Their SOC is super responsive and does a great job of catching incidences and being on top of any issues that arise."
  • "We are still getting many false positives."
  • "The ITDR product is coming along great, however, we are still getting many false positives."

What is our primary use case?

We are using it as an MDR, EDR, antivirus product. We are also utilizing their Microsoft 365 ITDR, which is the new name, and their security awareness training platform. The only product they offer that we do not use currently is their SIM tool. It is on our radar and our roadmap, but we are not using it.

What is most valuable?

Their SOC is super responsive and does a great job of catching incidences and being on top of any issues that arise. They have an automated remediation tool that works well for both ITDR and EDR. It allows approval of remediations, performs all the necessary steps, verifies them, and resolves issues efficiently.

What needs improvement?

The ITDR product is coming along great, however, we are still getting many false positives. A lot of user accounts get locked out over nonissues, and while they are easy to resolve, someone still needs to take action. It is time spent by a technician.

For how long have I used the solution?

I have been using it for a little over two and a half years, coming up on three years.

What do I think about the stability of the solution?

I have never had a problem that was Huntress's fault.

What do I think about the scalability of the solution?

It is pretty scalable. I am currently running a little over twenty-five hundred endpoints without any problems or concerns about managing that number of computers.

How are customer service and support?

If I contact support, it is almost immediate. They respond quickly and work with me until the problem is fully resolved. They are thorough and ensure the problem is addressed without pushing responsibilities onto me unnecessarily.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Previously, we used SentinelOne, Webroot, and BlackPoint. I switched since I have tested SentinelOne multiple times and could bypass it. BlackPoint generates many false positives, taking more time to manage than Huntress.

How was the initial setup?

The initial setup process was smooth. We were provided with an engineer who wrote a script based on our current structure and remote management software. This script allowed easy deployment, and Huntress's support ensured everything went smoothly.

What about the implementation team?

We were given an engineer who sat down with us, understood our current setup, wrote a script for deployment, and did all the backend work necessary for a smooth deployment.

What's my experience with pricing, setup cost, and licensing?

The pricing is piecemeal, per agent on EDR, MDR, and per user on ITDR. It can get expensive for small to medium businesses if large license quantities are not purchased. However, given Huntress's success rate, I am willing to pay for a product that performs well.

Which other solutions did I evaluate?

The alternatives I have used include SentinelOne, Webroot, and BlackPoint.

What other advice do I have?

I rate Huntress an eight out of ten. I prefer using it over other security tools because it has been reliable and efficient in catching incidents and isolating threats quickly.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Nick Mrotek - PeerSpot reviewer
Service Delivery Manager at Netirio
Real User
Top 10
Helped us to reduce the need for expensive security tools
Pros and Cons
  • "Huntress helped us to reduce the need for expensive security tools or expensive security analysts. That's very important, especially with us being a a smaller business. Not having to purchase larger software has been great."
  • "The integration with our RMM could be better."

What is our primary use case?

We use the solution as our antivirus.

How has it helped my organization?

We were looking for a more lightweight solution for an antivirus. We've had some in the past that have been really hard to either install, uninstall, and work with. Huntress integrated right in with Microsoft Defender, and it worked perfectly.

What is most valuable?

The automatic remediation is the most valuable feature for us. It works great. If our team can't look at an issue exactly at the moment, it's just good to know that there's Huntress that can come in and be able to remediate most, if not all, issues. If there's something that needs a further look at, we can automate the alerts. It's proven to be a lot more efficient than other antiviruses we've worked with in the past.

It's easy to use Huntress overall. I haven't had too many issues. I haven't really had to contact or support with anything. So far, so good.

Huntress is a solution tailored specifically for the small and medium business market. It sits on top of Windows Defender, so you do not have to have either expertise or other software. It works well as a standalone client. 

Removal, specifically, has been very, very nice. Others have been clunky when it comes to removing files or the application itself. Huntress has the uninstall option straight from the admin portal. That's been a great great feature.

We've witnessed the benefits of Huntress both immediately after we deployed it, and after some time. The ease of use was noticed immediately. But then, eventually, when it comes to either losing a client or having someone who's left having to remove it from their machine, just having the ability to uninstall very seamlessly becomes very useful.

The solution is fully managed by Huntress 24/7. It's reduced our workload in terms of triaging or managing alerts. It's very much reduced the attention to detail that we've needed to have, especially since it's such a reputable company. We feel confident in having them remediate some issues so that we don't have to be looking at them all the time.

Huntress helped us to reduce the need for expensive security tools or expensive security analysts. That's very important, especially with us being a smaller business. Not having to purchase larger software has been great.

I don't know if our organizational security has drastically improved. However, it has done what it needs to do. We haven't lost security; we've maybe become more secure with it. That said, just having that presence of mind, knowing that we do have a very sophisticated team and product behind us, has been wonderful. 

What needs improvement?

The integration with our RMM could be better. That's been one of the tougher things. Having more availability to integrate with RMM is what we need right now. Even though we can create a script, it doesn't always work as seamlessly as it should. 

For how long have I used the solution?

I've used the solution for about a year. 

What do I think about the stability of the solution?

The stability has been great. We've had no issues. 

What do I think about the scalability of the solution?

I haven't had the chance to scale. However, there seem to be no issues with scaling up or down. 

How are customer service and support?

The availability of SOC-team support is great. They are friendly and offer good advice. It's not as big of a company as other solutions, yet the support team seems to be on top of things. 

In terms of ongoing support, there has only been one or two times when we wanted some further clarity on a remediation that had been completed. That was about it. The ease of communication is great. You aren't on hold and you aren't passed around to different people. Their support is pretty state-of-the-art.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have previously used SentinelOne and Sophos. We switched over to Huntress completely and no longer use them. We primarily switched based on pricing.

How was the initial setup?

The initial setup was really easy. It just sits on top of Windows Defender, so it was very easy. After that, just configuring the the different profiles and policies that we wanted to apply had to be done, and that was a very easy process. The deployment itself took about a week. 

In terms of maintenance, so far, it auto-updates. 

What about the implementation team?

Might have had a third party assist in the implementation. 

What's my experience with pricing, setup cost, and licensing?

The cost-effectiveness of Huntress, compared to other solutions, is much greater. The pricing is good. It's where it should be.

Which other solutions did I evaluate?

We did shop around a bit. However, with the price, it was a pretty easy decision.

What other advice do I have?

I'd rate the solution ten out of ten. 

New users should mostly ensure that they know that this product is going to stand on top of Windows Defender and integrate with it. If someone is utilizing Windows Defender, they just need to ensure that they know that this product has to operate with Windows Defender to get its full capability.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: MSP
Flag as inappropriate
PeerSpot user
Pieter Van Der Walt - PeerSpot reviewer
Founder / Director at CX consulting
Real User
Top 10
Great for SMBs and has excellent customer support
Pros and Cons
  • "Users usually note improvements in a matter of days. In others, it is immediately. It varies according to the environment."
  • "It would be ideal if they could create some incentives to help more partners get clients to onboard it."

What is our primary use case?

We're a Huntress partner. It's being used by certain clients as an alternative to mainstream EDRs.

How has it helped my organization?

The feature that I like about Huntress, which I have not seen with any other solution, is the proactive incident checking. The team flags certain potential malicious incidents. The ease of use regarding implementation has also been great. 

Overall, Huntress ensures a better cyber security posture. It provides a good baseline for security. Having the peace of mind that you have a decent set of guys or a team behind you is excellent.

What is most valuable?

The solution's simplicity, ease of implementation, and thoroughness are all valuable aspects. It doesn't put a heavy load on endpoints. 

Huntress has good support. 

It's a solid solution. For SMEs, it is an extremely good solution to have.

It has behavioral-based algorithms. Having that peace of mind that you actually have a group of experienced SOC analysts who are there watching is helpful. I don't have to be there to attend to the potential incidents straightaway 24/7. It takes a strain off of the partner company. As a user, you can actually go and rest and have a fairly peaceful weekend. If something happens, you have a good, solid team behind you that will attend to any potential threats that pop up over the weekend or any given day.

Of all the different solutions I work with, Huntress is one of the easiest.

As a partner, Huntress is useful for the SMB market. It integrates with Microsoft Defender and it really makes things so much easier. It offers a single glass pane, and you can see exactly what's happening.

We had one incident, where a user was trying to click on a potential malicious link. However, the processes were fairly quickly identified, and everything was killed literally within a couple of seconds. That incident was very effectively stopped.

The fact that the solution is fully managed by Huntress 24/7 frees up quite a lot of time from a technical point of view. We don't have to, first of all, employ a local resource. The potential local resources that were available, they can now just look at maybe assisting with some of the alerts. With Huntress, now they have time available to perform other tasks. Also, we're now a bit more proactive than reactive. We're likely saving 50% to 60% of our time. 

We make use of Huntress' ability to automatically remediate low-severity threats. That automatic automated remediation has positively affected workloads and security. With any type of automation, you free up time. You also know that once there's an incident, certain steps have already been taken. The technician will be able to see if some of the mundane tasks have already been performed, and that way, they don't have to waste time redoing those.

Using Huntress helped reduce the need for expensive security tools or hiring expensive security analysts for our clients.

Huntress affected the overall security of our clients. It provides a good layer of security. Security is a layered approach. 

Users usually note improvements in a matter of days. In others, it is immediate. It varies according to the environment.

Huntress utilizes AI in a very clever way, especially on the behavioral-based level. Typical attacks don't always utilize the old traditional signature-based attacks. They utilize it quite effectively.

What needs improvement?

The pricing could always be lower, however, it already is good value for money.

It would be ideal if they could create some incentives to help more partners get clients to onboard it. 

They should grow their market and spend a bit more time and effort on South Africa.

For how long have I used the solution?

I've been using the solution for three years. 

What do I think about the stability of the solution?

The solution is stable. Aside from some occasional general maintenance, it's great. I'd rate it ten out of ten.

What do I think about the scalability of the solution?

We have clients that range from three users to up to 65.

I'd rate scalability eight out of ten. 

How are customer service and support?

They offer very good support. It's a simple email away. The responses are great. In a nutshell, you know you have a company that backs you as a partner. They are proactive.

Support is superb. I can't complain. It's effective. It's quick. The turnaround time on submitting complaints is very, very quick. If I report something today, maybe by tomorrow someone will revert. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've worked with various solutions, including SentinelOne and Acronis.

From a deployment point of view and from a configuration setup point of view, Huntress is just easier. It's simplistic. The rate of false positives for reporting is much less, in my experience. It's just a much easier product to use.

How was the initial setup?

The deployment is pretty straightforward. It's literally a couple of minutes per client. The integrations make it simple.

We've got seven people dedicated to working with the solution. 

There isn't really any maintenance. Once it's set up and configured, the agents ensure that it is updated on a regular basis. If they do not update, for some reason or other, you are warned about it. 

What's my experience with pricing, setup cost, and licensing?

It's reasonably priced. The pricing is very competitive.

From the point of view where small businesses cannot afford a full stack, Huntress provides a basic solution where your threats are taken care of with the awareness training that's attached. If you are looking for something very basic to put in place, it's very good value for money.

I'd rate the pricing six out of ten. However, there are a whole lot of other factors that you need to look at when you purchase a solution. You need to look at not just the product. You need to look at the team behind the product. You need to look at effectiveness. You need to look at after-sales support, et cetera. In general, they are fairly inexpensive and very competitive. Even if they would bump up their prices a little bit, they are a decent solution to look at.

They are worth the investment.

What other advice do I have?

I'd recommend the solution to others. From value for money to ease of implementation to minimal false positives, it's great. You get peace of mind that you know that you've got someone that actually looks after you. 

I'd rate the solution ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Aaron Johns - PeerSpot reviewer
MSP Systems Engineer at A. B. M. Co., Inc.
Reseller
It is easy to use, provides excellent value, and performance
Pros and Cons
  • "The features of Huntress that I found helpful are the one-click remediation piece and the ability for me to reach out to their customer service reps and get this under control when there is a threat."
  • "To enhance the platform, I suggest adding a feature to forward Huntress's recommended response directly to the client, ensuring their clear understanding of the gathered information."

What is our primary use case?

We use Huntress to safeguard our endpoints as an additional security layer complementing our traditional antivirus solution. If the primary antivirus fails to identify a threat, Huntress is a crucial backup that fulfills our security requirements.

How has it helped my organization?

The Huntress interface is relatively easy to use. I had little to no training and had not used Huntress enough to navigate its website or fully understand its use case. It was simple to use.

Huntress is great for small and medium business markets. The value is excellent as well. It is a cost-effective solution, and the integration pieces that we're using with it are phenomenal.

I saw the true potential of Huntress a month after we implemented it.

Huntress's 24/7 monitoring has been invaluable for triaging and managing alerts. The platform handles most of the monitoring, allowing us to focus on understanding the alerts, their nature, functionality, and the detected threats. This approach has significantly improved our efficiency in this area.

Huntress's ability to automatically remediate low-severity threats has streamlined our workflow process, making it faster to respond.

Huntress has helped us reduce the need for expensive security tools or to hire costly security analysts. We're not big enough to have a large SOC team, so this has helped us until we can reach that level of growth.

Huntress helps protect our endpoints when traditional antivirus is not enough. So, we will rely heavily on it when our traditional antivirus software does not catch the threat.

What is most valuable?

The features of Huntress that I found helpful are the one-click remediation piece and the ability for me to reach out to their customer service reps and get this under control when there is a threat. I see it as a great way to isolate and remediate on the fly quickly. We did have a use case for that recently that worked out well.

What needs improvement?

I requested Huntress customer support to implement a feature enabling me to email myself generated reports or alerts, which I could then forward to our client. While this specific feature was unavailable, Huntress customer service successfully assisted us in obtaining the necessary email information. To enhance the platform, I suggest adding a feature to forward Huntress's recommended response directly to the client, ensuring their clear understanding of the gathered information.

For how long have I used the solution?

I have been using Huntress for one and a half years.

What do I think about the stability of the solution?

Huntress offers super reliable and rock-solid performance. We have not encountered any troubleshooting issues or problems with the software; it works as expected.

What do I think about the scalability of the solution?

The cloud-based nature of Huntress management allows for exceptional scalability. We can easily add licenses or agents as needed, and we haven't encountered any scaling limitations thus far.

How are customer service and support?

I contacted Huntress technical support once about a ransomware attack, and they responded promptly and effectively. We contained the attack within an hour.

How would you rate customer service and support?

Positive

What's my experience with pricing, setup cost, and licensing?

The Huntress pricing is an excellent value for what the product provides. It's a managed EDR solution with fair features, and I think it's great.

Which other solutions did I evaluate?

We have considered other solutions. The other EDR solution we considered was SentinelOne. We did look at SentinelOne, but we did not make a choice.

I did not choose Huntress. When I started a year and a half ago, Huntress was already implemented. However, with Huntress already implemented, it made it very clear that, given what we had recently worked on with one of our clients, Huntress was our best choice.

What other advice do I have?

I would rate Huntress ten out of ten.

We have experienced no maintenance requirements with Huntress, as our RMM solution automates most processes. Consequently, we do not need to address deployment, maintenance, or troubleshooting issues related to Huntress; it functions seamlessly.

New users need to be prepared for incident responses from Huntress. If they do not have an incident response plan, they need to create one first so they can handle and remediate quickly for their clients.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Huntress Managed EDR Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free Huntress Managed EDR Report and get advice and tips from experienced pros sharing their opinions.