TrustRadius Insights for Huntress are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.
Pros
Threat Hunting Capabilities: Multiple users have praised the product's excellent threat hunting capabilities, which efficiently identify security footholds and detect abuse against real Windows applications and services. This feature is highly valued as it helps users in identifying and remediating threats effectively.
Quiet Alerts: Many reviewers appreciate that the product is very quiet and only alerts them when necessary. This means that when they do receive an alert, it is something they need to pay attention to, increasing its significance.
Regular Reports with Explanations: Users find the regular reports provided by the product to be valuable. These reports include explanations of anomalous behavior, aiding users in identifying persistence mechanisms and gaining a comprehensive understanding of their endpoints' security status.
We use Huntress on all of our endpoints. If we ever have an issue they are on the phone before we are. We love that somebody is always watching our networks.
Pros
Looks at Code that is running on device
Contact use when things are wrong
Easy dashboard to see what is going on
Cons
I still dont get the MDR part of Huntress and breakdown costs
Mac still need work still can't get them fully functional
At my company we use Huntress for an external layer of protection for the network. We rely on Huntress to inform of us external threats or attempts to penetrate the network.
The main business problem that Huntress solves is protection and awareness of the unknown actors and processes trying to brute force into the network. Short of hiring a SOC service, which can be quite expensive, Huntress is the best value for peace of mind from external threats.
Pros
External threat reporting
External threat protection
External threat remediation
Cons
The portal has not really been updated
UI can be an adjustment to get used to
There are sometimes false positives
Likelihood to Recommend
Huntress is well suited for small to medium sized businesses who cannot afford a SOC team or third party service, but still need another layer of cybersecurity protection. Antivirus, Antimalware, firewalls etc are all well and good and 100% necessary, but these days they are just not enough. There are exploits, missing patches, and vulnerabilities that well publicized and a full time job to stay on top of - Huntress is here to help with that.
We use Huntress to detect anything that makes it past threat protection platforms and for basic exterior scanning for open ports. The Ransomware canaries help to determine if an infection starts we can isolate the host before it spreads. We also count on Huntress for when a foothold lands and how to properly clean it off.
Pros
Ease of deployment
Non-intrusive to host system
Fantastic support when something is going wrong
Eager to dig in with you to figure out issues
Cons
Diving into Agents for specific information, similar to RMM setups
Better explanation of investigations, what machine they're for or if in general.
Likelihood to Recommend
Onboarding new clients to find if they have something lurking in the background that an AV would consider "part of the system" at the first scan. This is great too for setting up automatic isolation for Ransomware events. Also great for home and small users who don't need a super invasive threat platform and to just utilize the Microsoft Devender
VU
Verified User
Engineer in Information Technology (1-10 employees)
We leverage Huntress to protect our customers' endpoints. Huntress provides a unique view of activity on the endpoint and complements other endpoint security solutions in place. The power comes in Huntress' ability to investigate indicators and determine whether they are a threat or not. Additionally, we needed a solution that could be easily deployed, not process or memory-intensive, and is a low touch from an ongoing maintenance perspective.
Pros
Identifying persistence mechanisms
Playing well with others, i.e. other endpoint solutions
Excellent 24X7 support
Providing remediation assistance once a detection has been made
Continuously adding robust features without charging extra
Cons
Enhance reporting capabilities
Provide some connectivity to SIEMs/SOARs
Likelihood to Recommend
It is awesome for any Windows environment, big or small. It is one of the easiest pieces of software you will deploy. It requires very few firewall policies to allow it to work. It maintains itself via updates. It is incredibly lightweight. So, if you need a solution that is actively surveying your network looking for threats that are installed on endpoints, this is the solution for you.
Huntress is on all servers and endpoints. The product is extremely powerful at finding breaches and footprints of malicious activity that other security products do not often see. Huntress is extremely quiet so if they are alerting us, it has always been some sort of issue. Huntress is also extremely good at proactively looking back and looking across their install base to seek out where else they have seen similar footprints and when they first showed up for threats that had been ongoing and not previously disclosed.
Pros
Using the latest industry knowledge of threats that have been ongoing, but not previously known and projecting it back in time against their installed endpoints to identify machines that are vulnerable or breached and when it these events occurred
Very quiet. If they alert, it is a thing.
Very good at remediation.
They communicate extremely well when it matters.
While there are the most extensive products more often than not they are the first to alert us to a threat.
Cons
Now that they have EDR capability, they need to fully participate in MITRE testing for direct comparison against other EDR products.
Now that they are going into Managed Antivirus and EDR with isolation capabilities they need to update their SLA comparative to other vendors
Support for non-Windows OSes for consistency in a network
It would be nice to seed canary files in custom shares on servers.
Likelihood to Recommend
Anything that is a domain controller, contains financial data, personally identifiable information, or is internet-facing needs a Huntress agent. When bad things are happening, our first question internally is done they have Huntress on the potentially affected endpoints.
Huntress leverages their Managed detection and response to help in identifying advanced persistent threats that basic antivirus misses. They have 24/7 threat hunting, when a threat is identified it is reviewed by a real human. An agent is installed on each windows device but it is really lightweight and has no noticeable impact on system performance.
Pros
Threat hunting
Detection of Advanced Persistent Threats
Managed Antivirus
MDR
Managed Detection and Response
Cons
Pricing
Triggered Scanning
Overhauling the layout now that new features have been added.
Likelihood to Recommend
Huntress is great at detecting and identifying things that basic antivirus misses. Huntress detected fileless malware that was on a server that was completely ignored by the antivirus that was installed on the computer. It also detected a KMS activation bypass that was installed on a server. I would recommend installing it as a second party to verify the findings of the antivirus.
Huntress provides a second level of protection for all our client and internal endpoints. We know that our backs are covered if our traditional AV and other solutions should fail. We also utilize learning resources from Huntress Labs to stay up to date on the latest threats. Lastly, they are constantly releasing new features that we continue to operate, such as AV management for Windows Defender, making using this built-in software viable for an MSP and providing cost savings.
Pros
Threat hunting
Education
Partner Engagement
Cons
Threat hunting visibility
Dashboards
Not much else
Likelihood to Recommend
Huntress is great for a managed service provider to provide a better cybersecurity stack to their endpoints/customers. Some smaller clients cannot afford high-priced SOC services but require SOC-level protection. Along with a couple of other layers of security, Huntress provides peace of mind for the MSP that if a threat were to arise, they would be notified with specific instructions for dealing with that threat.
In building our security practice and stack, we were looking for a security product that fits the needs of all of our users and our customers. The product needed to be safe and secure, obviously, but more to that would reduce our cost of support while improving the security in our customer base. Huntress MDR ticks almost all of our boxes and has set my mind at ease, allowing me to take that much wanted rest, especially over the holidays, when our customers are more vulnerable. Huntress helps to highlight any potential footholds, security issues, and ongoing threat detection on all our servers and workstations.
Pros
Security foothold identification
Detects abuse against real windows applications and services
Great security reports
Cons
[I] would like to see more SOC as a Service - service from them.
[I would also like] improved Intune integration, especially with Windows Defender and the rest of the suite.
Likelihood to Recommend
A great product that highlights any and all persistent footholds on the network and does a great job on breach monitoring. The support staff are great, efficient, and are able to reach out when there is an issue. Most problems are cleared out/mitigated before we even know about them. A great product to add to your security stack.
Huntress allows us to have the constant availability and visibility of a SOC without having to deploy or contract one. The mechanisms that allow for odd behavior to be elevated to the attention of a live security professional are a key safeguard against zero day attacks. We aren't large enough to deploy this in-house.
Pros
Lightweight sensor/agent on endpoint
Regular reports
Some explanation as to anomalous behavior
Cons
Reports could be more detailed
Dashboard isn't customizable
No direct sales option
Likelihood to Recommend
This is a great solution for the SMB space where the attack surface is not very large. The assumption is that compromise is impossible to stop and better remediation should be the focus of security efforts. Automated remediation might suit most, but Huntress acts more like an advisor than an enforcer. This is important in our environment where users employ lots of applications and customizations.