We performed a comparison between BeyondTrust Endpoint Privilege Management and Huntress based on real PeerSpot user reviews.
Find out in this report how the two Anti-Malware Tools solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Technical support is good."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"I find the solution’s features like section management, password management, and analytics valuable."
"The solution's technical support is good."
"It scales easily and the product is stable."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"While threat hunting is undoubtedly the most valuable feature, the combination of IP scanning, foothold identification, and canary monitoring has also proven to be incredibly beneficial."
"Huntress' best feature is the threat-hunting expertise that is part of their 24/7 SOC."
"The most valuable aspect of Huntress is its 24/7 SOC service."
"It is incredibly efficient for our engineering team because Huntress provides all the information needed to fix issues, not just flag them."
"We don’t have the required staff to watch the issues that are happening. It is good to have a team from Huntress who can watch the logs 24/7. The tool’s automatic remediation is also fantastic. The solution’s interface is also nice and easy to use. The Huntress team saves us time by going through the issues."
"Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
"Scalability-wise, I rate the solution a ten out of ten...I rate the technical support a ten out of ten."
"It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"How the accounts are presented in the solution's UI can be improved."
"It only has limited support for Mac."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"I would like the API to be a little better. They are getting there."
"Their EDR can have increased coverage for Macintosh. They do not fully secure Macintosh computers."
"Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."
"One area for improvement in Huntress would be to allow for PSA integration from a specific IP address or hostname for better security measures."
"I'd like Huntress to implement a component that can analyze network traffic for specific sites."
"Some of Huntress' reporting could be improved."
"The Huntress is not a standalone solution. It really needs to be used with something else such as Microsoft Defender or another antivirus solution. It would be nice to see the product fleshed out by the Huntress team and include the antivirus solution part as well. I want it to be a full-fledged XDR product. It would push the tool to a higher price range but it would be nice to see the fleshed out features. I want them to integrate more features from the XDR realm."
"The application control system could benefit from improvements in identifying and managing both whitelisted and blacklisted applications."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 12th in Anti-Malware Tools with 27 reviews while Huntress is ranked 5th in Anti-Malware Tools with 12 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Huntress is rated 9.4. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Huntress writes "Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Huntress is most compared with SentinelOne Vigilance, Blackpoint Cyber MDR, CrowdStrike Falcon Complete, Arctic Wolf Managed Detection and Response and Bitdefender MDR. See our BeyondTrust Endpoint Privilege Management vs. Huntress report.
See our list of best Anti-Malware Tools vendors.
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.