Try our new research platform with insights from 80,000+ expert users

Huntress Managed ITDR vs Sweet Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
117
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Software Development (1st), AI Observability (2nd)
Huntress Managed ITDR
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
12
Ranking in other categories
Identity Threat Detection and Response (ITDR) (4th)
Sweet Security
Average Rating
9.0
Reviews Sentiment
8.0
Number of Reviews
3
Ranking in other categories
Vulnerability Management (36th), Cloud Workload Protection Platforms (CWPP) (16th), Cloud Security Posture Management (CSPM) (25th), Cloud-Native Application Protection Platforms (CNAPP) (15th), Identity Threat Detection and Response (ITDR) (12th), Cloud Detection and Response (CDR) (6th)
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
Jeremy Harlan - PeerSpot reviewer
SOC Analyst L2 at a computer software company with 51-200 employees
Managed detection has stopped account takeovers and has strengthened our incident response playbooks
Their threat analytics and process insights are exceptional. When Huntress Managed ITDR finds malware, a virus, or a phishing email, their analytics have improved significantly over time. I remember when they were not very detailed, but now they provide comprehensive information down to the specific type of dependency affected on a host machine. They show us exactly where all the infected files are located on the computer, which makes cleanup straightforward and invaluable. I know they partner with Microsoft, and if you have Huntress Managed ITDR and Microsoft Defender, it is truly near real-time as stated. That is a very accurate claim.
reviewer2761083 - PeerSpot reviewer
Director of Security Operations at a tech vendor with 501-1,000 employees
Has reduced investigation time by correlating application and infrastructure events
Sweet Security has room for improvement in two areas. One is for robust integration with automations and playbooks. We have our internally developed platform that operates around security incident playbooks, so the connection between those two systems would be great. The option to run specific playbooks through the Sweet Security platform would help us a lot, but these must be fully customizable. We prefer not to block the business from progressing unless we are fully sure that it is an incident. Most of the actions I would take would revolve around containment or notification on a specific platform and not via email or similar communications. The second area is around the code perspective. I know it's just the start of a long journey that Sweet Security is going to go through to become a platform that also handles code, but I would expect options for a complete analysis and writing policies for infrastructure as code. The next great thing that Sweet Security can do is to turn toward IAC, how it is handled and enforced, to tackle potential breaches of policy before they really happen.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"SentinelOne Singularity Cloud Security offers several valuable features, most notably the rapid vulnerability notifications that provide timely alerts regarding our infrastructure."
"The visibility is the best part of the solution."
"The user-friendly dashboard offers both convenience and security by providing quick access to solutions and keeping us informed of potential threats."
"The SentinelOne Singularity Cloud Security has substantially affected my risk posture, as it was the first tool that notified me of the public exposure of a repository by a developer, allowing me to resolve the issue within minutes."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
"The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"The maintenance for Huntress Managed ITDR requires no maintenance on my end; it is self-reliant in that once it is set up, it does most of the heavy lifting, and you really just have to review alerts as it monitors for any issues."
"Huntress Managed ITDR examines various nulls from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action."
"You get value, and you get more value than most people realize from their products versus competitors."
"However, with Huntress Managed ITDR, we don't have to deal with those scenarios because they simply don't happen."
"I rate the overall solution as a ten out of ten."
"I would definitely recommend Huntress Managed ITDR to other users because it is easy to use, and it does not provide too many false positives, which is very important, especially when you are dealing with a company the size that we are; we really need to focus on actionable alerts, and it is the best tool that we have found for protecting the Microsoft 365 environment."
"Huntress Managed ITDR is very good because I can make sure we're not getting false positives and a whole bunch of alerts that just become noise."
"One feature I appreciate the most about Huntress Managed ITDR is its integration with Microsoft Defender, because most users in our organization have Microsoft Business Premium licenses, so Defender for Endpoint comes along with Business Premium, meaning there is no extra cost."
"The value of having real-time visibility in our cloud environment with Sweet Security changes everything because it differentiates between identifying and reacting to something that is not really a risk and something that is truly a risk that needs to be treated."
"Before we had Sweet Security, upon any type of detection of activity, we needed to conduct lots of investigations in different platforms and logs until we could build the larger picture, but once we inserted Sweet Security, we are able to actually see each and every request being made from the application level towards the infrastructure, making it much easier and reducing the time for an analyst to understand what's really happening."
"The value we see from having real-time visibility into our cloud environment is significant, as Sweet Security serves as our eyes and ears inside AWS, telling us what we are doing wrong so we can fix it."
 

Cons

"We don't get any notifications from SentinelOne Singularity Cloud Security when the clusters are down."
"We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating."
"The integration with Oracle has room for improvement."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in SentinelOne Singularity Cloud Security."
"When we request any changes, they must be reflected in the next update."
"They could generally give us better comprehensive rules."
"The SentinelOne customer support needs improvement, as they are sometimes late in responding, which is critical in a production issue."
"They can work on policies based on different compliance standards."
"The product needs further maturity, with some improvements in the user interface."
"In areas where Huntress Managed ITDR could improve, I would suggest exclusions and the ability to add whitelisting for file types or select files, making it more transparent."
"I see improvements to the HaloPSA integration as something that could be better; it would be good to see more information in the ticket raised."
"The product needs further maturity, with some improvements in the user interface."
"If anything, it's created more work, but that's because we're now seeing things that we weren't seeing before."
"In terms of room for improvement, I think they can expand the coverage beyond Microsoft 365."
"A downside of Huntress Managed ITDR is that some devices show they are not super compatible with the Defender for Endpoint integration."
"More in-depth reporting could be beneficial for the solution."
"One area for improvement could be the alerts, as we have an issue with the alert time, the time it takes for the system to send the alert, but besides that, there is nothing special."
"The option to run specific playbooks through Sweet Security platform would help us a lot, but these must be fully customizable."
"There was something a year ago that caused a production issue in my company, but they fixed it within an hour."
 

Pricing and Cost Advice

"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"The pricing for PingSafe in India was more reasonable than other competitors."
"Its pricing is okay. It is in line with what other providers were providing. It is not cheap. It is not expensive."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"Singularity Cloud Security by SentinelOne is cost-efficient."
"We found it to be fine for us. Its price was competitive. It was something we were happy with. We are not a Fortune 500 company, so I do not know how pricing scales at the top end, but for our cloud environment, it works very well."
"I understand that SentinelOne is a market leader, but the bill we received was astronomical."
"It was reasonable pricing for me."
Information not available
Information not available
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
Computer Software Company
12%
Insurance Company
9%
Outsourcing Company
8%
Financial Services Firm
8%
Wellness & Fitness Company
14%
Healthcare Company
11%
Financial Services Firm
9%
Non Profit
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise21
Large Enterprise54
By reviewers
Company SizeCount
Small Business13
Midsize Enterprise1
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I think the pricing of SentinelOne Singularity Cloud Security is a bit high.
What needs improvement with PingSafe?
We did not try to use the threat investigations feature from SentinelOne Singularity Cloud Security.Drift detection w...
What is your experience regarding pricing and costs for Huntress Managed ITDR?
My experience with pricing, setup costs, and licensing has been pretty good; we got a good rate and continue to recei...
What needs improvement with Huntress Managed ITDR?
I see improvements to the HaloPSA integration as something that could be better; it would be good to see more informa...
What is your primary use case for Huntress Managed ITDR?
My main use case for Huntress Managed ITDR is protecting people's accounts on 365. I use Huntress Managed ITDR to pro...
What is your experience regarding pricing and costs for Sweet Security?
I'm not really into the specifics of the pricing, but as far as I know, it is cost-effective.
What needs improvement with Sweet Security?
Sweet Security has room for improvement in two areas. One is for robust integration with automations and playbooks. W...
What is your primary use case for Sweet Security?
We are cloud native and are using Sweet Security for call runtime protection. It is much bigger than just runtime pro...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

Find out what your peers are saying about Huntress Managed ITDR vs. Sweet Security and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.