We compared Huntress and Webroot Business Endpoint Protection based on our users reviews.
Our conclusion is that Huntress and Webroot Business Endpoint Protection have simple and convenient setup processes. Huntress is known for its expertise in threat-hunting and its 24/7 SOC, while Webroot is praised for its user-friendly interface. Huntress could improve its reporting and integration with other solutions, while Webroot could enhance its reporting system and integrate better with reliable OTXs. Huntress has generally favorable pricing, while Webroot is considered affordable and cost-effective. Customer support for both products has received mixed feedback, with some users finding it responsive and others experiencing issues.
We primarily focused on the topics below:
The summary above is based on 15 interviews we conducted with Huntress and Webroot Business Endpoint Protection users. To access the interviews' full transcripts, download our report.
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"Fortinet is very user-friendly for customers."
"Forensics is a valuable feature of Fortinet FortiEDR."
"This is stable and scalable."
"The price is low and quite competitive with others."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"It is incredibly efficient for our engineering team because Huntress provides all the information needed to fix issues, not just flag them."
"Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
"We don’t have the required staff to watch the issues that are happening. It is good to have a team from Huntress who can watch the logs 24/7. The tool’s automatic remediation is also fantastic. The solution’s interface is also nice and easy to use. The Huntress team saves us time by going through the issues."
"I have found it valuable that this solution is always there and always armed."
"While threat hunting is undoubtedly the most valuable feature, the combination of IP scanning, foothold identification, and canary monitoring has also proven to be incredibly beneficial."
"The EDR product is simple to install. It is low maintenance. All the alerts go to Huntress first, and their analyst team reviews them and sends actionable things our way."
"The most valuable aspect of Huntress is its 24/7 SOC service."
"Huntress' best feature is the threat-hunting expertise that is part of their 24/7 SOC."
"It is excellent endpoint protection for mobiles that does everything it says it will."
"Valuable features include good scanning, very light footprint and management console that the client can access and (just as important) in which I can see status of groups of computers (I am a consultant, IT role)."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"The initial setup is not complex at all. It's very straightforward."
"Webroot's tech support is pretty good; they've given me some pointers."
"The solution is very simple and straightforward to use."
"It is very lightweight on the workstations, not slowing them down while still doing its job very well."
"It is an easy-to-use and easy-to-configure product."
"We find the solution to be a bit expensive."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"Making the portal mobile friendly would be helpful when I am out of office."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"The only minor concern is occasional interference with desired programs."
"ZTNA can improve latency."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"Some of Huntress' reporting could be improved."
"The Huntress is not a standalone solution. It really needs to be used with something else such as Microsoft Defender or another antivirus solution. It would be nice to see the product fleshed out by the Huntress team and include the antivirus solution part as well. I want it to be a full-fledged XDR product. It would push the tool to a higher price range but it would be nice to see the fleshed out features. I want them to integrate more features from the XDR realm."
"We need an API to automatically retrieve metrics and data about backend activity so we can generate client reports."
"In the next release, I'd like to see more intuitive dashboards."
"I'd like Huntress to implement a component that can analyze network traffic for specific sites."
"The application control system could benefit from improvements in identifying and managing both whitelisted and blacklisted applications."
"I would like the API to be a little better. They are getting there."
"Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."
"It would be nice if it had a feature for automatically generating reports on the client end for device status, security status and backup information."
"One of the biggest pain points is that it's not really ransomware-oriented. They will be able to catch some, but that's where Sentinel One is a better player compared to Webroot."
"Since they're dealing with multi-core environments now, the best option would be for them to enhance the product so that the product can automatically do an assessment on the machine."
"It needs to improve the problems with the faster connection, and have a huge reduction in false positives."
"Webroot Business Endpoint Protection needs to focus on how they can widen their area of scope by not just being an antivirus tool anymore. The shortcoming in the customization area of the tool needs improvement."
"Reporting system could be improved."
"Webroot is very reactionary. It waits until the threat is active within memory to try and detect it. They need better pre-execution detection and prevention."
"Their customer support should be better. We started having some issues with it, and we didn't get the required support."
More Webroot Business Endpoint Protection Pricing and Cost Advice →
Huntress is ranked 13th in Endpoint Protection Platform (EPP) with 12 reviews while Webroot Business Endpoint Protection is ranked 34th in Endpoint Protection Platform (EPP) with 30 reviews. Huntress is rated 9.4, while Webroot Business Endpoint Protection is rated 8.2. The top reviewer of Huntress writes "Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "Lightweight and not hard to set up however, does not offer good reporting". Huntress is most compared with SentinelOne Vigilance, Blackpoint Cyber MDR, CrowdStrike Falcon Complete, Arctic Wolf Managed Detection and Response and Sophos MDR, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, HP Wolf Security, SentinelOne Singularity Complete and Cynet. See our Huntress vs. Webroot Business Endpoint Protection report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.