

Find out what your peers are saying about Huntress, CrowdStrike, Arctic Wolf Networks and others in Managed Detection and Response (MDR).
I really value how Huntress does most of the heavy lifting and monitoring for the identities.
You will not be able to beat Huntress Managed ITDR on pricing, and that is considering the capabilities Huntress Managed ITDR provides at their price level.
In terms of a return on investment for our security posture, it's absolutely paying for itself to ensure that we are better secure compared to what we were without it.
it could be quicker
The L1 engineer should be more technical to improve the support.
They are quick to respond and help us explain why Huntress marked an identity in a certain way.
They primarily handle ITDR communications through chat, they made an exception and provided a call for a critical situation to walk me through the remediation process.
They've been very responsive when we have had to use them.
It is easy to scale with the support of CrowdStrike.
I can deploy a number of clients without impact as long as there are a sufficient number of licenses.
Once all objectives were met, the solution proved to be fully scalable.
I've never had limitations on scaling or performance issues.
Huntress Managed ITDR is protecting about 120 users. In terms of the people that log into it, it's two or three IT admins, but we've got 120 licenses, so it's protecting 120 Microsoft accounts.
Whether there are ten users or three hundred, it attaches to the Microsoft tenant, making it effortless to scale.
The solution is stable, like Falcon, and does not cause any problems for the agent to work with minimal memory.
I find that it is very stable; however, there is always room for improvement.
I would rate the stability of Huntress Managed ITDR as a ten, as I have not really experienced any downtime, bugs, or glitches.
In terms of stability, the solution is very stable, and the cloud platform itself is reliable.
Once it is deployed, it updates automatically and takes care of itself.
There are several issues we are facing with CrowdStrike Falcon Complete MDR, including data overload, noise, and false positive alerts.
Patch management in vulnerabilities needs improvement.
For UI/UX, it is good, but I think they should keep up with the times.
There's a confusing aspect with the escalation options; applying conditions to a specific identity is not immediately visible and requires using a three-dot menu.
It's a very simple and easy-to-use interface in terms of recommendations and feedback.
I still see many issues indicating that devices are not compliant due to policy conflicts, and it has been almost a month trying to figure out how to make all devices compliant.
From an enterprise level perspective, it should be reduced by approximately 20 to 25%.
Compared to other companies, Huntress keeps costs reasonable, offering 24/7 vigilance without price gouging.
I think it was two or three dollars a user a month.
The licensing cost, again, is a good price point that allows me to add it on to clients and it becomes a no-brainer for them to add it because the price of the service makes sense.
We have achieved 100% success in detection with our clients and have no need for reclamation.
We are getting real-time response from CrowdStrike Falcon Complete MDR.
I find CrowdStrike Falcon Complete MDR to be effective and stable, with minimal false positives.
It provides protection against M365 identity compromises, like admin account breaches.
The best features of the solution are the fact that there are real people behind it who watch the alerts and then escalate as required, and the fact that there is an immediate support team or SOC team behind it if we have any questions.
The best feature is the lack of false positives; when we receive an alert from Huntress Managed ITDR, the majority of the time they are true positives that are actionable, unlike some other tools which generate a lot of noise.
| Product | Mindshare (%) |
|---|---|
| CrowdStrike Falcon Complete MDR | 6.0% |
| SentinelOne Wayfinder Threat Detection and Response | 7.2% |
| Huntress Managed EDR | 5.6% |
| Other | 81.2% |
| Product | Mindshare (%) |
|---|---|
| Huntress Managed ITDR | 6.9% |
| CrowdStrike Falcon | 12.8% |
| Microsoft Defender for Identity | 9.7% |
| Other | 70.6% |


| Company Size | Count |
|---|---|
| Small Business | 35 |
| Midsize Enterprise | 18 |
| Large Enterprise | 32 |
| Company Size | Count |
|---|---|
| Small Business | 14 |
| Midsize Enterprise | 2 |
CrowdStrike Falcon Complete MDR combines AI-driven detection, real-time threat insight, and robust endpoint protection to deliver a comprehensive managed detection response. It ensures rapid incident handling, integrates smoothly with multiple tools, and minimizes false positives while extending SOC capabilities.
CrowdStrike Falcon Complete MDR stands out with its AI-powered detection and efficient threat intelligence, offering a strong foundation for endpoint security. It features an intuitive dashboard, seamless integration with tools, and swift incident responses, all facilitated by its SOC extension. Users find value in its vulnerability management and lightweight deployment, which reduces false positives. This combines managed threat hunting with automated forensics, enhancing cybersecurity with proactive threat prevention and remediation. Suggested improvements include better reporting, SIEM integration, and performance enhancements to prevent slowdowns. Suggested better API documentation and expanded Linux support align with calls for improved offline intrusion detection and false positive management. Improved customization, integration with third-party tools, aesthetics, pricing, and training options are also desired.
What features make CrowdStrike Falcon Complete MDR valuable?In various industries, CrowdStrike Falcon Complete MDR is implemented to provide advanced endpoint protection for mobile and server security. Organizations leverage its threat intelligence, behavioral analysis, and vulnerability detection features to defend against ransomware, fileless attacks, and enable EDR functionalities. By facilitating threat hunting and incident response, they ensure continuous monitoring, often integrating with Microsoft Defender and other security measures for robust cybersecurity coverage and efficient patch management.
Huntress Managed ITDR specializes in protecting Microsoft 365 environments by analyzing abnormal logons, run events, and unsanctioned VPNs. It offers efficient deployment, direct SOC support, and seamless integration with Microsoft Defender, enhancing security strategies against identity compromises.
Huntress Managed ITDR provides a robust platform for centralized management of Microsoft environments. It emphasizes fast deployment and automatic remediation to protect against threats such as admin account breaches. With direct SOC support, it offers actionable insights and reports that bolster security measures. Though improvements are needed in areas like reporting and interface responsiveness, it remains a cost-effective choice for those integrating with Microsoft Defender for Endpoint, helping organizations guard against abnormal logins and vulnerabilities.
What are the key features of Huntress Managed ITDR?Huntress Managed ITDR is employed across multiple industries to integrate clients with Microsoft 365 and secure their endpoints and cloud tenants. They use the platform for monitoring activity and preventing unauthorized access. Managed Service Providers utilize it for its robust threat detection and sign-in awareness, connecting devices to handle incidents efficiently.
We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.