

Find out in this report how the two Identity Threat Detection and Response (ITDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
I really value how Huntress does most of the heavy lifting and monitoring for the identities.
You will not be able to beat Huntress Managed ITDR on pricing, and that is considering the capabilities Huntress Managed ITDR provides at their price level.
In terms of a return on investment for our security posture, it's absolutely paying for itself to ensure that we are better secure compared to what we were without it.
They are quick to respond and help us explain why Huntress marked an identity in a certain way.
They primarily handle ITDR communications through chat, they made an exception and provided a call for a critical situation to walk me through the remediation process.
They've been very responsive when we have had to use them.
They have been responsive to our needs as integrators and those of the client.
I've never had limitations on scaling or performance issues.
Huntress Managed ITDR is protecting about 120 users. In terms of the people that log into it, it's two or three IT admins, but we've got 120 licenses, so it's protecting 120 Microsoft accounts.
Whether there are ten users or three hundred, it attaches to the Microsoft tenant, making it effortless to scale.
I would rate the stability of Huntress Managed ITDR as a ten, as I have not really experienced any downtime, bugs, or glitches.
In terms of stability, the solution is very stable, and the cloud platform itself is reliable.
Once it is deployed, it updates automatically and takes care of itself.
There's a confusing aspect with the escalation options; applying conditions to a specific identity is not immediately visible and requires using a three-dot menu.
It's a very simple and easy-to-use interface in terms of recommendations and feedback.
I still see many issues indicating that devices are not compliant due to policy conflicts, and it has been almost a month trying to figure out how to make all devices compliant.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
Compared to other companies, Huntress keeps costs reasonable, offering 24/7 vigilance without price gouging.
I think it was two or three dollars a user a month.
The licensing cost, again, is a good price point that allows me to add it on to clients and it becomes a no-brainer for them to add it because the price of the service makes sense.
It provides protection against M365 identity compromises, like admin account breaches.
The best features of the solution are the fact that there are real people behind it who watch the alerts and then escalate as required, and the fact that there is an immediate support team or SOC team behind it if we have any questions.
The best feature is the lack of false positives; when we receive an alert from Huntress Managed ITDR, the majority of the time they are true positives that are actionable, unlike some other tools which generate a lot of noise.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Identity | 5.1% |
| Huntress Managed ITDR | 3.9% |
| Other | 91.0% |

| Company Size | Count |
|---|---|
| Small Business | 12 |
| Midsize Enterprise | 1 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
Huntress Managed ITDR specializes in protecting Microsoft 365 environments by analyzing abnormal logons, run events, and unsanctioned VPNs. It offers efficient deployment, direct SOC support, and seamless integration with Microsoft Defender, enhancing security strategies against identity compromises.
Huntress Managed ITDR provides a robust platform for centralized management of Microsoft environments. It emphasizes fast deployment and automatic remediation to protect against threats such as admin account breaches. With direct SOC support, it offers actionable insights and reports that bolster security measures. Though improvements are needed in areas like reporting and interface responsiveness, it remains a cost-effective choice for those integrating with Microsoft Defender for Endpoint, helping organizations guard against abnormal logins and vulnerabilities.
What are the key features of Huntress Managed ITDR?Huntress Managed ITDR is employed across multiple industries to integrate clients with Microsoft 365 and secure their endpoints and cloud tenants. They use the platform for monitoring activity and preventing unauthorized access. Managed Service Providers utilize it for its robust threat detection and sign-in awareness, connecting devices to handle incidents efficiently.
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
We monitor all Identity Threat Detection and Response (ITDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.