Try our new research platform with insights from 80,000+ expert users
reviewer2783733 - PeerSpot reviewer
Director, Marketing at a computer software company with 51-200 employees
MSP
Top 20
Dec 4, 2025
Managed security partnership has reduced costs and builds trust in our service packages
Pros and Cons
  • "Using Huntress Managed EDR has helped reduce the need for expensive security tools or to hire expensive security analysts, and it is important because we save money."

    What is our primary use case?

    Huntress Managed EDR is my main use case as part of a package for our managed and co-managed IT services. A specific example of how I use Huntress in my managed or co-managed IT services is that it is a part of the package that we sell.

    What is most valuable?

    The best features Huntress Managed EDR offers are security and the service received from the Huntress team.

    What I appreciate about the security features and the service from the Huntress team is that they always come prepared to meetings, are proactive, and definitely pay a lot of attention to the partnership.

    Huntress Managed EDR has positively impacted my organization because they have great reviews online, a raving fan base, and their social media is positive. When we are soliciting an IT services package with Huntress Managed EDR attached, that goes in a positive direction.

    What needs improvement?

    I do not have any comments at this time that would help improve Huntress Managed EDR.

    For how long have I used the solution?

    I have been using Huntress Managed EDR for two years.

    Buyer's Guide
    Huntress Managed EDR
    January 2026
    Learn what your peers think about Huntress Managed EDR. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
    881,036 professionals have used our research since 2012.

    How are customer service and support?

    The customer support from Huntress is better. I have used or evaluated other similar solutions, and while the protection has been similar, the support from the Huntress team is what is better.

    How would you rate customer service and support?

    What other advice do I have?

    When I include Huntress Managed EDR in my package, it is more about the reputation and trust. We do not see necessarily an uptick right now by just using the Huntress Managed EDR name.

    Huntress Managed EDR is easy enough for me to use.

    I probably evaluate Huntress Managed EDR as a solution specifically for the SMB market incorrectly; the VP of Managed Services is probably the right one.

    Using Huntress Managed EDR has helped reduce the need for expensive security tools or to hire expensive security analysts, and it is important because we save money.

    I do not have any idea how much we are saving or an example of how Huntress Managed EDR helped reduce those costs.

    My advice to others looking into using Huntress Managed EDR is that I would recommend it.

    I do not have any additional thoughts about Huntress Managed EDR before we wrap up.

    I rate Huntress Managed EDR overall as a 10.

    Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
    Last updated: Dec 4, 2025
    Flag as inappropriate
    PeerSpot user
    Timothy Breen - PeerSpot reviewer
    Help Desk Engineer at a computer software company with 11-50 employees
    MSP
    Top 20
    Sep 4, 2024
    It is affordable, powerful, and saves costs
    Pros and Cons
    • "The most valuable aspect of Huntress is its ability to isolate legacy systems from the network, preventing the spread of threats."
    • "Ultimately, the clarity of their alerts is paramount for effective threat communication and could benefit from clearer remediation steps."

    What is our primary use case?

    Huntress is one of our security layers. We also use Webroot for antivirus and SentinelOne. Huntress is particularly valuable because when we first implemented it, we discovered several potential issues with our PCs that we were able to address quickly. More recently, it has allowed us to be notified immediately if something bad is happening.

    We implemented Huntress to improve our security posture.

    How has it helped my organization?

    Last weekend, we experienced a potential breach prevented by Huntress' automated response. It involved the general manager at a car dealership who was unaware of an ongoing penetration test. This caused confusion until we contacted someone knowledgeable about the situation, allowing us to restore normalcy. This incident highlights the potential for serious consequences had the breach not been prevented.

    Huntress is easy to use. The portal is transparent, and the manual or automatic remediation recommendations are well-defined.

    It is a valuable addition to the SMB market. It is affordable and powerful.

    Since we started using Huntress, things have become more automated. One valuable feature they recently introduced is a test mode, which allows us to gauge our response to a simulated emergency without triggering an actual alert.

    Huntress' 24/7 monitoring is helpful. While it will alert us at all times, the alerts are usually important. The only low priority item is password alerting. When Huntress finds files that might have clear text passwords, it's not a high risk, but it's still good to inform the client about potential security issues.

    The auto-remediation capabilities are excellent because they allow for a set it and forget it approach, or users can simply revisit the portal to verify that everything is as expected.

    Huntress has helped reduce the need for expensive security tools and the hiring of security analysts. This can lead to savings equivalent to the cost of two security analysts, which is approximately $200,000 per year.

    Huntress has improved our security. It generally doesn't interfere with our other tools, as sometimes our antivirus or some of the other tools tend to flag legitimate activities.

    We have integrated Huntress with Webroot and SentinelOne. They each play a role in the security posture.

    We noticed an improvement in our security within a few weeks. Of course, there were many things to handle, especially when rolling it out at a new location. We tend to clean up a little bit initially, which increases our workload slightly. But once we get through that initial phase, everything runs smoothly.

    Huntress has saved us 20 percent in resources.

    What is most valuable?

    The most valuable aspect of Huntress is its ability to isolate legacy systems from the network, preventing the spread of threats. The automated remediation feature also provides significant value.

    What needs improvement?

    Huntress excels at explaining threats when they are presented in clear language. However, the sheer volume of threats and occasional ambiguity in remediation steps can make comprehensive tracking challenging. Ultimately, the clarity of their alerts is paramount for effective threat communication and could benefit from clearer remediation steps.

    For how long have I used the solution?

    I have been using Huntress for four years.

    What do I think about the stability of the solution?

    I would rate the stability of Huntress nine out of ten.

    What do I think about the scalability of the solution?

    I would rate the scalability of Huntress eight out of ten.

    How was the initial setup?

    The initial deployment was done using a script, taking one day. We integrate it with ConnectWise to push scripts out to PCs and monitor the deployment to ensure continuous operation and services running. We receive alerts for this, making it maintenance-heavy but ultimately worthwhile.

    Our deployment strategy was straightforward: set up the company, then implement and activate the scripts. I'm not heavily involved in deployments, but I've written a few scripts. When issues arise, like when our tool ThreatLocker halts a deployment, I step in to troubleshoot and resolve the problem.

    What was our ROI?

    Any prevention or early detection of an attack, like catching a cold before it spreads, will lead to significant savings in time, investment, and reputation. If we, as the Managed Service Provider, experience an exploit, it will negatively impact our reputation. Therefore, safeguarding our reputation is the best form of seeing a return on investment.

    What other advice do I have?

    I would rate Huntress nine out of ten. The services tend to stop, so we have a small script that restarts them. I don't know if there's a way they can make their service more resilient. That would reduce our maintenance burden.

    We have 20 people that use Huntress in our organization.

    We use Huntress on almost 25,000 devices.

    Huntress requires minimal maintenance.

    I would recommend Huntress to others. It lets you know about real-world attacks happening in near real-time. A couple of years ago, I remember Huntress alerted us about a laptop stolen at an airport, and we were able to isolate that laptop. It was eventually returned to the company, and they just had to call us to let us know. You can also turn off isolation, so it's not just a security feature, but it's almost like having LoJack for your laptop.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
    PeerSpot user
    Buyer's Guide
    Huntress Managed EDR
    January 2026
    Learn what your peers think about Huntress Managed EDR. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
    881,036 professionals have used our research since 2012.
    Jim Bolinski - PeerSpot reviewer
    President at a tech services company with 1-10 employees
    Real User
    Top 10
    Aug 4, 2024
    Has a manned security operation center, not AI-driven
    Pros and Cons
    • "The solution's most valuable feature is that it has a manned security operation center, not AI-driven."
    • "Huntress should have a more user-friendly interface because it takes some understanding to work our way through the interfaces."

    What is our primary use case?

    We're a managed service provider, and we install Huntress on our clients' computers to keep them safe.

    What is most valuable?

    The solution's most valuable feature is that it has a manned security operation center, not AI-driven.

    It is quite easy to use Huntress.

    I think Huntress is a very solid solution. It is a top-of-the-tier, cutting-edge tool that can find things others can't.

    We started to see the benefits of Huntress immediately after deploying it. I had been using another security vendor. For the first couple of days after deploying Huntress, we had numerous alerts about problems on people's systems, and we were able to address them.

    The fact that the solution is fully managed by Huntress 24/7 has definitely reduced the amount of noise alerts we get. When something actually gets to us, it is definitely actionable.

    Huntress' ability to automatically remediate low-severity threats has worked very well in our instances. I feel it has increased our security posture. It's just one component of our security stack, but it has definitely elevated our security stack.

    The solution has reduced our overall costs by combining security tools into its platform, which is very important to us.

    Huntress has significantly elevated our organization's overall security posture.

    We combined Huntress with Microsoft Defender and Webroot DNS, and it works quite well.

    Huntress is far superior to other solutions when it comes to providing proactive protection against threats. SentinelOne lets viruses through, while Huntress does not. The Norton product has a really high processor load. It's archaic how they design their product. However, operating the Norton or Symantec tool takes up a lot of processor resources.

    The way the Huntress SOC team works with us is far superior compared to the SOC teams of those other solutions. They are very responsive and respond within minutes, while others take days.

    What needs improvement?

    Huntress should have a more user-friendly interface because it takes some understanding to work our way through the interfaces. When you log in to the portal, there are many different categories to investigate. It would be good if the solution had a central alerts page to go to first rather than checking into all the categories to see if something needed to be addressed.

    For how long have I used the solution?

    I have been using Huntress for two years.

    What do I think about the stability of the solution?

    We haven’t faced any issues with the solution’s stability.

    What do I think about the scalability of the solution?

    The product is easy to deploy and doesn't really have any limitations related to scalability that I know of.

    How are customer service and support?

    The technical support team provides very speedy answers and always gets right to the point. They understand the problem and direct you to the right areas.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We previously used Webroot SecureAnywhere and found that Huntress picked up things that Webroot allowed.

    How was the initial setup?

    The solution's initial setup was not especially difficult, but it was also not easy. One person deployed the solution within three days.

    What's my experience with pricing, setup cost, and licensing?

    The solution's pricing is fair. I like that Huntress monitors for units that are no longer checking in and automatically removes them so that you don't get billed. Huntress is 5% to 10% more expensive than other tools we've evaluated.

    Which other solutions did I evaluate?

    Before choosing Huntress, we evaluated three other tools, including Norton Security and SentinelOne. The other tools did not pass our virus tests. When we created virtual environments and attacked them with viruses, both tools let the viruses get through.

    What other advice do I have?

    We have an API that we build into our managed service platform, which we just install from the script. Huntress does not necessarily require any maintenance. You have actionable items that will occur in the use of the product, but it's a set-it-and-forget-it installation.

    New users should ensure that their use case fits into the Huntress model. We investigated and found that our MM was compatible with Huntress, and it was a pretty smooth integration. I don't know whether all our MMs are as adept, but ours worked well.

    Overall, I rate the solution a nine out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
    PeerSpot user
    reviewer2344506 - PeerSpot reviewer
    Chief Security Officer at a computer software company with 51-200 employees
    MSP
    Top 20
    Feb 27, 2024
    A great option for the SMB market, enhances visibility into endpoint activity, and reduces the effort needed for handling alerts
    Pros and Cons
    • "The most valuable aspect of Huntress is its 24/7 SOC service."
    • "Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."

    What is our primary use case?

    We use Huntress to monitor our internal and customer systems for security vulnerabilities.

    We chose Huntress for its 24/7 managed detection and response services.

    Huntress is deployed entirely in the cloud. We use the Huntress portal to manage it and our RMM tool to distribute the agent to our devices.

    How has it helped my organization?

    Huntress is a great option for the SMB market. It's competitively priced and offers good value for the money, making it one of the most cost-effective security solutions available. Its team is highly qualified and delivers a quality product at a price point that fits the SMB budget. Enterprise tools can often be overly complex or expensive, and Huntress effectively addresses both of these concerns.

    It's extremely easy overall. We deploy the agent and it takes care of the rest.

    Huntress enhances visibility into endpoint activity by monitoring running processes. It employs a 24/7 human response team to analyze alerts from both the Huntress agent and Windows Defender Endpoint Protection. This team can then choose to isolate suspicious activity and limit its impact if deemed malicious, or escalate the case for further investigation.

    Some endpoint protection solutions may miss early warning signs of suspicious activity, such as unusual system behavior or potential footholds for attackers. This is often the case when deploying such solutions to new customers. However, it's important to remember that malicious activity doesn't happen every day in every environment. So, for some customers, its value might not be immediately apparent. It might take a few years before a serious incident occurs, highlighting the need for Huntress' detection and response capabilities. Therefore, the timeframe to see the benefits of Huntress can vary greatly.

    The fully managed service has certainly reduced the effort needed for handling alerts from endpoint protection solutions like Windows Defender. Eliminating the need to deal with false positives has been a significant benefit, greatly reducing our team's workload. Additionally, the SOC within the service effectively handles after-hours issues, minimizing the impact on our on-call staff.

    Instead of relying on expensive endpoint protection software, we successfully leveraged the built-in Windows Defender in conjunction with the Huntress agent. This combination, in our opinion, represents a significant improvement over using a potentially more robust but costly solution alone. The key advantage lies in the added human element: Huntress' 24/7 monitoring and endpoint isolation capabilities. This approach has demonstrably improved our security posture. However, it's unclear whether it fully eliminates the need for a high-cost security analyst. While Huntress certainly reduces expenses associated with lower-level resources tasked with the initial triage of false positive alerts, its impact on the role of a specialized security analyst remains to be determined.

    It has improved our overall security significantly. It adds another valuable layer of protection and provides greater visibility into endpoint activity. Perhaps the most significant benefit for us is the true 24/7 coverage. While our staff has extended hours, there's a gap overnight when no one is actively monitoring for security incidents. When time is of the essence, as it often is in cyber situations, having someone from Huntress available to instantly respond by isolating threats is invaluable. This service is certainly more cost-effective than attempting to staff our team for round-the-clock coverage.

    Our security started improving immediately after deployment. It began searching for pre-existing footholds or remnants of other malware that may not have been fully cleaned up from previous infections. The 24/7 SOC provided instant benefits—knowing we had that extra layer of protection with dedicated experts watching our systems was a reassuring feeling.

    What is most valuable?

    The most valuable aspect of Huntress is its 24/7 SOC service. If something suspicious is seen on an endpoint, even in the middle of the night, there is always someone available to react quickly and isolate the endpoint to mitigate the potential spread to others. 

    What needs improvement?

    Huntress' Process Insights feature could benefit from more robust search and filtering capabilities. Currently, it's quite basic, offering only a single search bar with limited granularity. Additionally, the data retention period is short, with access restricted to three days. While the SOC team can export a week's worth of data, extending this period to at least thirty days would be highly beneficial.

    Overall, we're generally satisfied with the solution. However, deeper integration with other endpoint protection platforms would be valuable. Ideally, Huntress should be able to ingest alerts from systems like CrowdStrike and conduct investigations similar to CrowdStrike's offerings. This would be particularly useful for us as a CrowdStrike partner.

    For how long have I used the solution?

    I have been using Huntress for three years.

    What do I think about the stability of the solution?

    Last week, we encountered an issue with the Huntress agent. Essentially, there are two components: the core Huntress agent and the Rio agent, added later about a year into our partnership for process insights. While Rio is valuable, we experienced a communication gap regarding its functionality.

    If Rio shut down for any reason e.g., computer reboot, or agent update, it wouldn't restart properly, creating a blind spot for the Hunter team as no data was transmitted. This issue emerged within the past two weeks and took a few days for Huntress to identify and resolve.

    Overall, the platform is generally stable, but we've faced some bumps in the road. One issue involved unclear communication about agent check-ins, and the other was the recent Rio shutdown problem.

    What do I think about the scalability of the solution?

    Huntress scales very well. We've grown from approximately 9,000 to 17,000 endpoints, and I haven't encountered any scalability issues.

    How are customer service and support?

    We're generally very pleased with the technical support. They respond promptly via chat, and if the frontline team can't resolve an issue, they escalate it swiftly. In one instance, their SOC analysts even helped us investigate malicious activity at our endpoints, something that deeply concerned us and our customers. In that situation, they truly went above and beyond to assist us.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We previously used Webroot, but it was ineffective at stopping the latest ransomware threats. That was the main reason we switched to Huntress. We replaced Webroot with the built-in Windows Defender plus the Huntress agent, and together they proved significantly more effective at stopping those threats than Webroot alone.

    How was the initial setup?

    The initial deployment was smooth. However, we realized a gap in our internal processes and understanding of how to respond to different alert levels.

    Our deployment was rushed due to signing the agreement during the Log4J vulnerability outbreak around Christmas 2020. The widespread threat forced us to prioritize deploying the Huntress agent quickly instead of following a slower, more deliberate approach to replacing Webroot.

    Fortunately, the Huntress agent seamlessly integrates with other endpoint protection solutions. This allowed deployment without disrupting existing protection or leaving us vulnerable during the transition.

    The additional 24/7 SOC visibility without replacing our current endpoint protection has been immensely valuable. While deployment was simple, we identified the need to refine internal processes and response protocols for different alert levels.

    We had a small team, perhaps two or three people, working on the deployment. In all honesty, it could have been done by a single person. Our deployment process is streamlined, and we have a large customer base. As a mid-sized MSP with over two hundred customers at the time, we had the manpower to spare. However, thanks to scripting and RMM tools, even a single individual could theoretically deploy Huntress to a large number of endpoints with ease.

    What about the implementation team?

    Being an MSP, we implemented the solution internally.

    What's my experience with pricing, setup cost, and licensing?

    Huntress is priced fairly for the services and value it provides.

    What other advice do I have?

    I would rate Huntress nine out of ten.

    Our team occasionally uses the automatic remediation feature for low-severity threats, but we don't heavily rely on it. When it comes to endpoint protection alerts, we prefer a more hands-on approach. Despite using automatic remediation to some extent, the feature's impact on our workload has been minimal.

    The biggest maintenance challenge with Huntress is the potential for certain firewalls, especially Fortinet models depending on their enabled features, to block communication from the agent on the endpoint back to the Huntress portal. This blockage isn't apparent from the endpoint itself. While the Huntress page might appear installed and running, the agent might have only checked in initially and stopped sending data. After a month of inactivity, Huntress removes the agent to prevent the portal from becoming overloaded with inactive agents. This creates blind spots in our monitoring, as we remain unaware of the missing data. Addressing this challenge has been difficult, as we rely on our RMM tool for endpoint management and strive to maintain a consistent active list. Continuously comparing this list with the Huntress portal to ensure they match has proven frustrating.

    When using Huntress the most crucial aspect is training our internal staff on how to respond to different alert levels. These levels typically fall into three categories: low, high, and critical. It's essential to have a clear action plan or standard operating procedure outlining how our team should handle each alert type. Additionally, basic training on the Huntress portal is recommended. The portal has various pages, modules, and tabs, so familiarizing our staff with navigating and interacting with it is crucial. This includes skills like isolating endpoints, removing isolation if necessary, and utilizing provided remediation tasks or manual remediation if preferred. Implementing these measures will significantly improve our incident response capability.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Microsoft Azure
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP
    PeerSpot user
    David Markley - PeerSpot reviewer
    President at a computer software company with 11-50 employees
    MSP
    Top 20
    Feb 27, 2024
    Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture
    Pros and Cons
    • "Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
    • "I'd like Huntress to implement a component that can analyze network traffic for specific sites."

    What is our primary use case?

    Over the years, Huntress has gained many features, but initially, it was the foothold detection that drew us to the solution. It excels at uncovering persistent threats that evade other security measures. Our staff often compares it to a baseball backstop: you might not hit every pitch, and the catcher might miss a ball, but the backstop is there to prevent a disaster. In the same way, Huntress acts as a safety net, a team of experts searching for threats that slip past other security layers.

    We observed threat actors continually refining their attack methods against the managed endpoints of our diverse clientele. We sought a security tool that avoided exaggerated claims of absolute protection. We understand that perfect security doesn't exist. Instead, we prioritized finding a partner with integrity and a genuine commitment to the SMB security mission, both for our clients and the broader community. Even before becoming an investor and customer, Huntress impressed us with their educational approach. They actively engage the MSP community, providing valuable knowledge, training, and insights into current threats. Their focus on raising security awareness before securing contracts resonated deeply with us. We admire their company culture and approach.

    Our client base presents a mixed deployment landscape. Some, particularly those in manufacturing, maintain significant on-premises infrastructure. In contrast, others have fully embraced the cloud and haven't adopted serverless technologies like the ones we offer. Therefore, our platform must cater to this diverse range of deployment models.

    How has it helped my organization?

    Huntress was likely the easiest tool we've ever deployed. It's low-touch, and we didn't anticipate any problems. The worst-case scenario would be an issue with their internet connection, but otherwise, it requires minimal interaction with the machines. Users are unaware of its background operation; it doesn't make changes or enforce rules initially, making the rollout very smooth. We even deployed it internally before broader implementation to familiarize ourselves and ensure it wouldn't cause any harm. My confidence stemmed from its ease of use and the high quality of its product.

    It is a cost-effective solution for the SMB market. It allows us to keep our costs competitive while ensuring optimal protection for our clients. Additionally, it instills a sense of quality and reliability in our operations. After all, we are human, and mistakes are inevitable. Huntress provides peace of mind for the MSP side by helping us mitigate those potential oversights.

    We observed the benefits of Huntress within the first two weeks of deployment. We discovered several previously unknown aspects of the managed environment. Subsequently, after implementing the change to simply push them out of their base stack, we were able to quickly identify well-responding machines, those requiring attention, and malfunctioning Wi-Fi protection. This process effectively illuminated areas requiring improvement from a management perspective.

    The fact that the Huntress system is managed 24/7/365 is extremely helpful for our workloads. Our staff typically works from seven in the morning to five in the afternoon, so there's only a small overlap with Huntress' coverage. However, we greatly benefit from them keeping an eye on things and being able to alert us in the middle of the night if something suspicious happens. We're very thankful for their round-the-clock monitoring, as it saves us from having to keep our staff up late or hire additional workers for overnight hours. This, in turn, saves us money on labor costs.

    There’s a feature that allows us to automatically remediate low-severity threats, and we have enabled it for certain clients. This feature has significantly reduced the number of minor issues that our SOC team would usually deal with, freeing them to focus on higher-level threats and more strategic tasks.

    Huntress has significantly improved our security posture. Their team provides exceptional vigilance, staying informed about emerging threats and tracking the tactics of bad actors. We've seen numerous instances where they've detected threats just as they activated. In some cases, we simply isolated the affected machine, while in others it didn't require such immediate action. Remarkably, a month later, the FBI contacted us to inquire about one of these potential threats. Fortunately, thanks to Huntress' swift intervention, there was no actual danger. This experience highlights their cutting-edge expertise, not just in technology, but also in understanding the evolving tactics of cybercriminals. They consistently stay ahead of the curve, or at least keep pace with, the ever-changing threat landscape.

    Huntress helps to reduce the need for expensive security tools and analysts. We have a superior base layer compared to just offering a standalone product. While it is a tool, it's also a product and service that includes access to the Huntress team's expertise. Their threat operations team monitors potential threats, so we don't need to dedicate our own time and resources to analyzing logs and information. They essentially do it for us.

    Finding cost-effective security partners is crucial, as we navigate competing demands. Some clients expect high effectiveness and demonstrably high value, while other vendor tools see rising costs. It's key to identify partners who deliver demonstrably good value for our investment, maximizing our effectiveness through optimized time and resource allocation.

    We begin to see improvements in our company's security within two days of deployment. Pushing the installation requires minimal effort. Typically, suspicious activity becomes apparent within the first 24 to 48 hours, which the system highlights immediately. After a week or two, the system learns usage patterns and adapts to the environment, providing us with a comprehensive understanding of our security posture. By then, we've proactively addressed any identified issues, resulting in a swift and efficient security monitoring process.


    What is most valuable?

    Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients. However, what truly convinced us to make it a core part of our security stack, instead of just deploying it selectively based on specific needs, was Huntress' introduction of Managed AV. This allowed us to replace our basic antivirus solution often Windows Defender for our predominantly Windows environment with a more robust option managed by Huntress. Managed AV essentially made Huntress our new baseline antivirus, replacing Windows Defender, while still allowing us to utilize premium solutions like SentinelOne for specific situations. Ultimately, this shift enabled us to expand our footprint from around 400-500 machines to an impressive 4,600.

    What needs improvement?

    I'd like Huntress to implement a component that can analyze network traffic for specific sites. This involves deploying network sensors that monitor beyond just endpoint data, which they currently gather, and identity information through their 365 integration. This additional layer would offer site-level visibility, allowing us to detect suspicious traffic even on devices where the Huntress endpoint agent can't be installed. For example, in manufacturing environments, network devices and IoT devices might not be compatible with the agent. Comprehensive site-wide visibility would significantly enhance our security posture.

    For how long have I used the solution?

    I have been using Huntress for around four years.

    What do I think about the stability of the solution?

    Huntress is stable. We have not encountered any issues.

    What do I think about the scalability of the solution?

    Easy scalability that requires minimal time investment from us. Their platform readily handles our needs.

    How are customer service and support?

    We've been using their service for years now with minimal technical issues. However, I've contacted their technical support several times, usually regarding security-related alerts. In some cases, it was a matter of needing clarification, while other times we simply couldn't find the relevant documentation. We wanted additional information about these alerts to improve our understanding and prevent future issues. Sometimes they get busy and their response time is slow but the quality of their service is great.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Previously, we used a variety of security solutions, but none specifically addressed the gap where users require items to be forwarded to other security layers. We solely relied on antivirus software or various EDR solutions at the time. We simply made the most of those tools available. Huntress did replace antivirus programs like Bitdefender and Webroot for us. Because we could utilize Managed AV, we no longer needed those other products. In that sense, it did take their place. However, Huntress entered the market to fill a previously unmet need and created a new market segment.

    How was the initial setup?

    The initial deployment was smooth, even when we encountered some misalignments between our expectations and reality, or when we had to adjust initial assumptions. Fortunately, we were able to rectify these issues quickly by modifying the agents. For example, if an agent was assigned to the wrong client, we could make a prompt correction.

    Overall, the deployment was very straightforward thanks to the ease of using PowerShell. The developers did a fantastic job making the process as user-friendly as possible.

    One person was required for the deployment.

    What about the implementation team?

    We handled the deployment internally, leveraging our existing RMM tool which already manages and deploys other software.

    What was our ROI?

    Huntress boasts a high return on investment. This translates to needing fewer staff dedicated to analyzing security tools, which is a significant benefit for us. Consequently, labor costs associated with incident monitoring decrease. Additionally, it provides a dedicated Security Operations Center team that continuously monitors for threats. Essentially, it's like getting two solutions for the price of one. I imagine the reduction in personnel costs would at least cover half the expense of incident investigation and response, which are typically more costly with other solutions. Overall, the ROI from Huntress is evident in our daily operations. The peace of mind and improved sleep Huntress brings are invaluable.

    What's my experience with pricing, setup cost, and licensing?

    While other options have emerged since Huntress' arrival, I believe it still offers the best value for the features and services it provides.

    Which other solutions did I evaluate?

    Many alternative security solutions originated from the enterprise market, resulting in high pricing that didn't fit our MSP pricing model for smaller clients. Additionally, while existing antivirus vendors offered bolted-on MSP options, standalone SOC services often lacked cost-effective models per endpoint. At the time, nothing quite like Huntress existed in the market.

    What other advice do I have?

    I would rate Huntress ten out of ten.

    Huntress is doing exactly what we need. However, we haven't fully explored its potential for expansion. Previously, my main request was Microsoft 365 integration, which they are now working on. We're currently conducting some early pilot tests with it. In essence, that integration addressed the major gap I identified.

    Most multi-tenant tools involve a dashboard, user interface, and the ability to create sub-organizations or child accounts. Each child account has access to all purchased products under its parent account. The key requirement is ensuring machines are accurately tagged to their respective companies. While infrequent, maintaining these tags involves verifying their correctness and fixing minor issues, such as typos or inconsistencies. This applies to most multi-tenant tools, not specific to Huntress. However, Huntress simplifies this process compared to other solutions. Unlike requiring uninstallation or redeployment in other tools, Huntress allows seamless correction and movement of tagged machines, minimizing errors and streamlining management.

    As long as we understand the platform's capabilities and the value it provides, we can avoid any misconceptions. I believe many MSPs tend to get overly excited about any new tool. We've faced similar challenges in the past, so it's crucial to remember that this isn't a "deploy and forget" solution. While the platform simplifies the process significantly, some effort is still required on our end to ensure proper configuration before deployment. It's more of a "set it and manage" tool compared to the others we use. Therefore, understanding the product, its position in our security stack, and how it complements existing tools is essential. We need to know how to explain its role and support it effectively for our clients. That's the key takeaway. Knowing its place in the security stack is fundamental.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
    PeerSpot user
    Nick Mrotek - PeerSpot reviewer
    Service Delivery Manager at a transportation company with 201-500 employees
    Real User
    Top 10
    Aug 1, 2024
    Helped us to reduce the need for expensive security tools
    Pros and Cons
    • "Huntress helped us to reduce the need for expensive security tools or expensive security analysts. That's very important, especially with us being a a smaller business. Not having to purchase larger software has been great."
    • "The integration with our RMM could be better."

    What is our primary use case?

    We use the solution as our antivirus.

    How has it helped my organization?

    We were looking for a more lightweight solution for an antivirus. We've had some in the past that have been really hard to either install, uninstall, and work with. Huntress integrated right in with Microsoft Defender, and it worked perfectly.

    What is most valuable?

    The automatic remediation is the most valuable feature for us. It works great. If our team can't look at an issue exactly at the moment, it's just good to know that there's Huntress that can come in and be able to remediate most, if not all, issues. If there's something that needs a further look at, we can automate the alerts. It's proven to be a lot more efficient than other antiviruses we've worked with in the past.

    It's easy to use Huntress overall. I haven't had too many issues. I haven't really had to contact or support with anything. So far, so good.

    Huntress is a solution tailored specifically for the small and medium business market. It sits on top of Windows Defender, so you do not have to have either expertise or other software. It works well as a standalone client. 

    Removal, specifically, has been very, very nice. Others have been clunky when it comes to removing files or the application itself. Huntress has the uninstall option straight from the admin portal. That's been a great great feature.

    We've witnessed the benefits of Huntress both immediately after we deployed it, and after some time. The ease of use was noticed immediately. But then, eventually, when it comes to either losing a client or having someone who's left having to remove it from their machine, just having the ability to uninstall very seamlessly becomes very useful.

    The solution is fully managed by Huntress 24/7. It's reduced our workload in terms of triaging or managing alerts. It's very much reduced the attention to detail that we've needed to have, especially since it's such a reputable company. We feel confident in having them remediate some issues so that we don't have to be looking at them all the time.

    Huntress helped us to reduce the need for expensive security tools or expensive security analysts. That's very important, especially with us being a smaller business. Not having to purchase larger software has been great.

    I don't know if our organizational security has drastically improved. However, it has done what it needs to do. We haven't lost security; we've maybe become more secure with it. That said, just having that presence of mind, knowing that we do have a very sophisticated team and product behind us, has been wonderful. 

    What needs improvement?

    The integration with our RMM could be better. That's been one of the tougher things. Having more availability to integrate with RMM is what we need right now. Even though we can create a script, it doesn't always work as seamlessly as it should. 

    For how long have I used the solution?

    I've used the solution for about a year. 

    What do I think about the stability of the solution?

    The stability has been great. We've had no issues. 

    What do I think about the scalability of the solution?

    I haven't had the chance to scale. However, there seem to be no issues with scaling up or down. 

    How are customer service and support?

    The availability of SOC-team support is great. They are friendly and offer good advice. It's not as big of a company as other solutions, yet the support team seems to be on top of things. 

    In terms of ongoing support, there has only been one or two times when we wanted some further clarity on a remediation that had been completed. That was about it. The ease of communication is great. You aren't on hold and you aren't passed around to different people. Their support is pretty state-of-the-art.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We have previously used SentinelOne and Sophos. We switched over to Huntress completely and no longer use them. We primarily switched based on pricing.

    How was the initial setup?

    The initial setup was really easy. It just sits on top of Windows Defender, so it was very easy. After that, just configuring the the different profiles and policies that we wanted to apply had to be done, and that was a very easy process. The deployment itself took about a week. 

    In terms of maintenance, so far, it auto-updates. 

    What about the implementation team?

    Might have had a third party assist in the implementation. 

    What's my experience with pricing, setup cost, and licensing?

    The cost-effectiveness of Huntress, compared to other solutions, is much greater. The pricing is good. It's where it should be.

    Which other solutions did I evaluate?

    We did shop around a bit. However, with the price, it was a pretty easy decision.

    What other advice do I have?

    I'd rate the solution ten out of ten. 

    New users should mostly ensure that they know that this product is going to stand on top of Windows Defender and integrate with it. If someone is utilizing Windows Defender, they just need to ensure that they know that this product has to operate with Windows Defender to get its full capability.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
    PeerSpot user
    Aaron Johns - PeerSpot reviewer
    MSP Systems Engineer at a retailer with 11-50 employees
    Reseller
    Top 20
    Jul 24, 2024
    It is easy to use, provides excellent value, and performance
    Pros and Cons
    • "The features of Huntress that I found helpful are the one-click remediation piece and the ability for me to reach out to their customer service reps and get this under control when there is a threat."
    • "To enhance the platform, I suggest adding a feature to forward Huntress's recommended response directly to the client, ensuring their clear understanding of the gathered information."

    What is our primary use case?

    We use Huntress to safeguard our endpoints as an additional security layer complementing our traditional antivirus solution. If the primary antivirus fails to identify a threat, Huntress is a crucial backup that fulfills our security requirements.

    How has it helped my organization?

    The Huntress interface is relatively easy to use. I had little to no training and had not used Huntress enough to navigate its website or fully understand its use case. It was simple to use.

    Huntress is great for small and medium business markets. The value is excellent as well. It is a cost-effective solution, and the integration pieces that we're using with it are phenomenal.

    I saw the true potential of Huntress a month after we implemented it.

    Huntress's 24/7 monitoring has been invaluable for triaging and managing alerts. The platform handles most of the monitoring, allowing us to focus on understanding the alerts, their nature, functionality, and the detected threats. This approach has significantly improved our efficiency in this area.

    Huntress's ability to automatically remediate low-severity threats has streamlined our workflow process, making it faster to respond.

    Huntress has helped us reduce the need for expensive security tools or to hire costly security analysts. We're not big enough to have a large SOC team, so this has helped us until we can reach that level of growth.

    Huntress helps protect our endpoints when traditional antivirus is not enough. So, we will rely heavily on it when our traditional antivirus software does not catch the threat.

    What is most valuable?

    The features of Huntress that I found helpful are the one-click remediation piece and the ability for me to reach out to their customer service reps and get this under control when there is a threat. I see it as a great way to isolate and remediate on the fly quickly. We did have a use case for that recently that worked out well.

    What needs improvement?

    I requested Huntress customer support to implement a feature enabling me to email myself generated reports or alerts, which I could then forward to our client. While this specific feature was unavailable, Huntress customer service successfully assisted us in obtaining the necessary email information. To enhance the platform, I suggest adding a feature to forward Huntress's recommended response directly to the client, ensuring their clear understanding of the gathered information.

    For how long have I used the solution?

    I have been using Huntress for one and a half years.

    What do I think about the stability of the solution?

    Huntress offers super reliable and rock-solid performance. We have not encountered any troubleshooting issues or problems with the software; it works as expected.

    What do I think about the scalability of the solution?

    The cloud-based nature of Huntress management allows for exceptional scalability. We can easily add licenses or agents as needed, and we haven't encountered any scaling limitations thus far.

    How are customer service and support?

    I contacted Huntress technical support once about a ransomware attack, and they responded promptly and effectively. We contained the attack within an hour.

    How would you rate customer service and support?

    Positive

    What's my experience with pricing, setup cost, and licensing?

    The Huntress pricing is an excellent value for what the product provides. It's a managed EDR solution with fair features, and I think it's great.

    Which other solutions did I evaluate?

    We have considered other solutions. The other EDR solution we considered was SentinelOne. We did look at SentinelOne, but we did not make a choice.

    I did not choose Huntress. When I started a year and a half ago, Huntress was already implemented. However, with Huntress already implemented, it made it very clear that, given what we had recently worked on with one of our clients, Huntress was our best choice.

    What other advice do I have?

    I would rate Huntress ten out of ten.

    We have experienced no maintenance requirements with Huntress, as our RMM solution automates most processes. Consequently, we do not need to address deployment, maintenance, or troubleshooting issues related to Huntress; it functions seamlessly.

    New users need to be prepared for incident responses from Huntress. If they do not have an incident response plan, they need to create one first so they can handle and remediate quickly for their clients.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
    PeerSpot user
    COO at a tech services company with 11-50 employees
    MSP
    Top 10
    Mar 18, 2024
    Reduced triage time, great support, and good price for MSPs
    Pros and Cons
    • "It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry."
    • "Their EDR can have increased coverage for Macintosh. They do not fully secure Macintosh computers."

    What is our primary use case?

    We use their EDR platform and their MDR platform. By implementing Huntress, we wanted to add another layer of security to our workstations across all of our clients.

    How has it helped my organization?

    Threat protection on the endpoints and great customer support are some of the benefits. There is a great vendor relationship. We could see its benefits pretty immediately. They work well with you. They are very attentive, and they make sure that their partners get whatever support they need.

    It has reduced the triage time. When they do find an alert or an issue, many times, they post an accurate resolution, so my technicians do not have to investigate to determine a resolution. It is already outlined for them.

    Huntress has the ability to automatically remediate low-severity threats. We use this feature in some cases and not in all cases. It works well when we have used it. It has impacted our workload and security. The faster you can fix the security issue, the better off you are.

    Using Huntress has helped reduce the need for expensive security tools or to hire expensive security analysts. It is important. It is hard to maintain a security staff.

    We are much more secure today than before starting to use Huntress.

    What is most valuable?

    It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry.

    What needs improvement?

    Their EDR can have increased coverage for Macintosh. They do not fully secure Macintosh computers.

    For how long have I used the solution?

    We started with them at least four years ago.

    What do I think about the stability of the solution?

    I have not seen any stability-related issues so far.

    What do I think about the scalability of the solution?

    It is very scalable.

    How are customer service and support?

    They are very good. They are very fast to respond, especially in emergencies. They have great support. I would rate them a 10 out of 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We were using Bitdefender. We switched because Huntress was more comprehensive and had 24/7 SOC.

    How was the initial setup?

    We use their cloud portal, and we deploy from there. I was involved in the initial vetting of the product and the vendor, but I was not involved in doing the installation.

    In terms of maintenance, when updates need to be pushed out, we make sure that they are pushed out. They normally get installed automatically. We have a tech person who daily makes sure that everything is okay in the portal. There is no real maintenance. There is nothing that we would not do for any other vendor.

    What was our ROI?

    After deploying Huntress, we could immediately see improvements in our organization's security.

    What's my experience with pricing, setup cost, and licensing?

    It works well for an MSP.

    Which other solutions did I evaluate?

    We evaluated Blackpoint Cyber and SentinelOne. We chose Huntress just because of what they offered. Blackpoint Cyber and SentinelOne are great products. It was a hard decision between the three, but we chose Huntress.

    What other advice do I have?

    Those evaluating this solution can research it online. They can ask their peers or just contact Huntress. They will guide them through the whole process.

    I would rate Huntress a 10 out of 10.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
    PeerSpot user
    Buyer's Guide
    Download our free Huntress Managed EDR Report and get advice and tips from experienced pros sharing their opinions.
    Updated: January 2026
    Buyer's Guide
    Download our free Huntress Managed EDR Report and get advice and tips from experienced pros sharing their opinions.