Try our new research platform with insights from 80,000+ expert users

Axiad Conductor vs Huntress Managed ITDR comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Axiad Conductor
Average Rating
9.6
Reviews Sentiment
7.7
Number of Reviews
6
Ranking in other categories
Authentication Systems (23rd), Identity Management (IM) (58th), Privileged Access Management (PAM) (40th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (29th), Passwordless Authentication (9th), Multi-Factor Authentication (MFA) (7th)
Huntress Managed ITDR
Average Rating
10.0
Reviews Sentiment
8.8
Number of Reviews
3
Ranking in other categories
Identity Threat Detection and Response (ITDR) (11th)
 

Featured Reviews

Eric Brown - PeerSpot reviewer
The day-to-day tasks, running the servers, and making sure that everything is patched is all handled by the platform
The most valuable feature is the overhead management of the platform. There is less for my team to worry about. The day-to-day tasks, running the servers, and making sure that everything is patched is all handled by the platform. We just consume the service and work with them to refine it, making it even more valuable. Aside from Active Directory, anything that is a multi-factor platform is handled through Axiad Cloud. It is critical for helping to enforce usage of authentication devices across our organization. One of our requirements to continue some of our contracts is to have multi-factor authentication across all devices accessing the network. It is extremely easy to enroll a user with “One Click Issuance”. I have had very few calls to the service desk regarding enrollment. It takes a couple of minutes to enroll a user with "One Click Issuance". Deploying and managing authenticators is very easy, either done by a mobile application or enrollment of an OTP token. It is very simple. This is important to my userbase, which makes it important to me. Functionality-wise, it is pretty solid.
Kevin - PeerSpot reviewer
Peace of mind in identifying compromises in your M365 tenants
Huntress Managed ITDR examines various signals from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action. It's a comprehensive solution covering endpoints and cloud tenants, offering peace of mind. I recognized its benefits immediately, as it provides protection against M365 identity compromises, like admin account breaches.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The life cycle management of credentials is the aspect that we have found to be the most useful... The differentiator that Axiad provided was the ability to provide users a way to self-serve the updating of their credentials on their private keys. That was the feature we were most interested in and Axiad does an excellent job of it."
"The solution has also saved us time by having end-users troubleshoot issues through the MyCircle feature, and has definitely reduced the efforts of our administrators. It is saving us five to 10 minutes per incident."
"It's very user-friendly. We're issuing YubiKeys for our corporate users and they just plug it in, go to the Axiad Cloud portal, and click the issue button. It's a couple of steps."
"Aside from Active Directory, anything that is a multi-factor platform is handled through Axiad Cloud. It is critical for helping to enforce usage of authentication devices across our organization."
"What I have found most valuable is the overall way Axiad listened to our problems and helped us solve them. They provided guidance and expertise, with their experience, that enabled us to be successful in a very challenging space."
"And when it comes to enrolling a user, it's super easy with One Click Issuance... It's so easy now that we can offload the process to our clients who can self-enroll. Previously, we would have to do the enrollment process because it was so complicated."
"The initial setup was very easy."
"Implementing Huntress Managed ITDR has improved our business by allowing us to be more proactive with our security posture."
"Huntress Managed ITDR examines various nulls from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action."
"I rate the overall solution as a ten out of ten."
"The centralized management with the EDR and ITDR is beneficial."
 

Cons

"macOS is notoriously ever-evolving and it's difficult to keep pace with it as it pertains to certain kinds of crypto authentication. That's really not even on Axiad. That's a decision by Apple, but it makes it a moving target."
"We would prefer that the solution be hosted in Canada because we're a Canadian entity. That would be nice to have. It's not a feature, as such, but it would really make us a lot happier if it could be located in Canada."
"I'm looking forward to seeing how they move to FIDO U2F as their primary authentication method across all of their solutions."
"There are just some minor tweaks that could be made on the front end. It would be cool to have nicknames for authenticator devices. If you have more than one, it's hard to discern what you have."
"I would like a more modern look to the portal."
"With their licensing model, it becomes hard to scale. For example, we couldn't roll it out enterprise-wide because if you scale it across more than 100,000 users, the cost becomes too exorbitant."
"More in-depth reporting could be beneficial for the solution."
"More in-depth reporting could be beneficial for the solution."
"The product needs further maturity, with some improvements in the user interface."
"The product needs further maturity, with some improvements in the user interface."
"If anything, it's created more work, but that's because we're now seeing things that we weren't seeing before."
 

Pricing and Cost Advice

"It's very cheap on a per-year basis. The cards themselves last about three years and the license is on the order of double-digit dollars per user, and not hundreds of dollars per user, per year."
"Don't just focus on the hardware or software costs of acquiring a solution, but look at it from the perspective that so much of what it takes to run a PKI environment has to do with the people who are running it.... look at the total cost of ownership and not just the cost of acquisition."
"Axiad's pricing was what we were expecting. It was at the right spot. They were competitive."
"The pricing is very competitive for what is offered at the level that we need. They are right there with what the industry standards are. They tend to be a little bit less, in terms of cost, when we are talking about security at government standards. So, I would say that they have a slight advantage on cost compared to the industry average. They are the lower cost solution and the best bargain out on the market today."
Information not available
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
15%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
17%
Insurance Company
12%
University
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Huntress Managed ITDR?
In terms of pricing, it seemed pretty cheap for us. I think it was two or three dollars a user a month. Given that it wasn't a product we were expecting to buy, it was a somewhat unanticipated cost...
What needs improvement with Huntress Managed ITDR?
In my opinion, Huntress Managed ITDR has room for improvement in the speed of some screen refreshing, as it isn't as fast as it perhaps could be. The fact that it caches results is a bit odd for a ...
What is your primary use case for Huntress Managed ITDR?
My use case is really just for threat detection and response to observe and get more awareness of where our sign-ins are coming from, so we can better protect our login environment.
 

Also Known As

Axiad Cloud
No data available
 

Overview

Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: July 2025.
865,384 professionals have used our research since 2012.