Director, Engineering & Services Professional at a computer software company with 51-200 employees
Reseller
Top 20
Dec 3, 2025
I would appreciate more features in the stack. I would like Huntress MDR and SIEM to integrate with EDRs like SentinelOne to combine that level of intelligence and information into their stack so that they can leverage whatever protections the client has and gather that intelligence to help with the MDR side. Regarding the SIEM, I would like to see more features added. I would appreciate the capability of setting our own alerting based on certain triggers within the logs so that we can compete and fill a void that their SIEM has compared to other SIEMs in the industry such as Perch Security for ConnectWise.
Find out what your peers are saying about Huntress, Microsoft, Wazuh and others in Security Information and Event Management (SIEM). Updated: November 2025.
Security Information and Event Management (SIEM) tools offer comprehensive visibility and management of an organization’s security events through real-time analysis and correlation of data from multiple sources.
SIEM solutions provide a centralized platform for managing security alerts and logs from various sources such as network devices, servers, and applications. They help identify and mitigate potential threats by analyzing event data for unusual patterns and correlations. These tools...
I would appreciate more features in the stack. I would like Huntress MDR and SIEM to integrate with EDRs like SentinelOne to combine that level of intelligence and information into their stack so that they can leverage whatever protections the client has and gather that intelligence to help with the MDR side. Regarding the SIEM, I would like to see more features added. I would appreciate the capability of setting our own alerting based on certain triggers within the logs so that we can compete and fill a void that their SIEM has compared to other SIEMs in the industry such as Perch Security for ConnectWise.
There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data.