Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs Huntress Managed ITDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
2
Ranking in other categories
Authentication Systems (45th), Endpoint Detection and Response (EDR) (57th), Extended Detection and Response (XDR) (39th)
Huntress Managed ITDR
Average Rating
10.0
Reviews Sentiment
9.0
Number of Reviews
2
Ranking in other categories
Identity Threat Detection and Response (ITDR) (11th)
 

Featured Reviews

PB
Achieves robust data protection and reliable security with the help of advanced automation features
We promote customers to purchase our ESET EDR_XDR and Data Loss Prevention (DLP) solutions. In our office, with about one hundred and fifty people, we use ESET EDR_XDR personally to protect data from unauthorized threats and gain early awareness to protect against cyber attacks The cost and basic…
Kevin - PeerSpot reviewer
Peace of mind in identifying compromises in your M365 tenants
Huntress Managed ITDR examines various signals from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action. It's a comprehensive solution covering endpoints and cloud tenants, offering peace of mind. I recognized its benefits immediately, as it provides protection against M365 identity compromises, like admin account breaches.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup of ESET EDR_XDR is very simple, easy to deploy, and manage."
"The solution is easy to use."
"The centralized management with the EDR and ITDR is beneficial."
"I rate the overall solution as a ten out of ten."
"The initial setup was very easy."
"Huntress Managed ITDR examines various nulls from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action."
 

Cons

"The solution could improve how it scours each website."
"ESET EDR_XDR needs to conduct more research and development and innovations in early detection of attacks."
"The product needs further maturity, with some improvements in the user interface."
"More in-depth reporting could be beneficial for the solution."
"More in-depth reporting could be beneficial for the solution."
"The product needs further maturity, with some improvements in the user interface."
 

Pricing and Cost Advice

"I rate the solution’s pricing a six or seven out of ten.."
Information not available
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
858,469 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
20%
Financial Services Firm
13%
Computer Software Company
13%
Manufacturing Company
8%
Computer Software Company
24%
Insurance Company
17%
University
10%
Performing Arts
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What needs improvement with ESET EDR/XDR?
ESET EDR_XDR needs to conduct more research and development and innovations in early detection of attacks. Improvements in preventive maintenance and early detection of cyber attacks are necessary ...
What needs improvement with Huntress Managed ITDR?
More in-depth reporting could be beneficial for the solution.
What is your primary use case for Huntress Managed ITDR?
I use Huntress Managed ITDR for 365 protection, monitoring log run events, security, and abnormal logons.
 

Also Known As

ESET Secure Authentication
No data available
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
Information Not Available
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: June 2025.
858,469 professionals have used our research since 2012.