What is our primary use case?
We utilize Huntress for endpoint protection across the accounts we manage. When requiring endpoint detection and response capabilities, we leverage Huntress for that functionality as well.
Instead of relying solely on basic antivirus software, we implemented Huntress to elevate our security posture. This empowered us not only to proactively track down threats but also to collaborate with experts in identifying and remediating them.
How has it helped my organization?
Huntress is extremely easy to use.
Huntress is a great solution for the SMB market.
By minimizing the time we spend identifying risks, Huntress helps us reduce the overall risk landscape for our clients. They are also great partners to work with, and we saw the benefits almost immediately.
Huntress's 24/7 managed service significantly improved our overall workflow and empowered our employees to focus on tasks aligned with their skill sets. This has enabled them to develop their expertise and take on greater responsibilities.
The ability to automatically remediate the low severity threats is great.
Huntress has improved our overall security posture. We were able to start improving our security within the first three months of deployment.
What is most valuable?
While threat hunting is undoubtedly the most valuable feature, the combination of IP scanning, foothold identification, and canary monitoring has also proven to be incredibly beneficial.
What needs improvement?
The application control system could benefit from improvements in identifying and managing both whitelisted and blacklisted applications. Additionally, it would be valuable to have the ability to automatically lock down applications identified as potential threats.
Buyer's Guide
Huntress
March 2024
Learn what your peers think about Huntress. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
769,630 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Huntress for five years.
What do I think about the stability of the solution?
Huntress has been reliable with no stability issues.
What do I think about the scalability of the solution?
Huntress is a scalable solution.
How are customer service and support?
The technical support is knowledgeable and helpful.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Previously, we used Kaspersky for our security needs. However, by combining Huntress with SentinelOne, we were able to successfully transition away from it.
How was the initial setup?
The initial deployment is straightforward. The deployment took 30 days and required two people to complete.
What about the implementation team?
The implementation was completed in-house.
What was our ROI?
We have seen a 20 to 30 percent return on investment.
What's my experience with pricing, setup cost, and licensing?
The pricing is competitive, in line with Huntress's offerings, and aligns well with our business model.
What other advice do I have?
I rate Huntress a nine out of ten.
Organizations are comfortable taking on certain calculated risks. However, I believe we need to employ specific types of staff to align our service delivery with our resource allocation. The Huntress platform has facilitated this crucial realignment.
The tool itself does not require maintenance but there is ongoing management.
Users should ensure they have an accurate inventory of the assets they need to protect, the chosen protection methods, and any additional relevant details. Assigning one or two dedicated individuals as "Champions" of the tool will help them fully leverage its benefits.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller