We are a Managed Service Provider. We use the solution to offer extra protection to customer machines.
Cyber Security Engineer at Apex Computing Services Ltd
Finds password files and offers extra protection to customer machines
Pros and Cons
- "Huntress helps us replace traditional antivirus solutions with an EDR. I like how easy it is to use and deploy. Support is good- they've responded quickly when I've had issues. I like it a lot so far. It reports valuable information and filters out things I don't need to know."
- "I'd like it if Huntress could scan for software that's out of date or has open vulnerabilities. That would be useful for us. Scanning for vulnerable software would be helpful. Also, we've set it up to create a ticket in our ticketing system when there's an alert. It would be nice if closing that ticket would also close the Huntress alert. It doesn't do that right now, but they're working on adding that feature."
What is our primary use case?
What is most valuable?
Huntress helps us replace traditional antivirus solutions with an EDR. I like how easy it is to use and deploy. Support is good- they've responded quickly when I've had issues. I like it a lot so far. It reports valuable information and filters out things I don't need to know.
The solution is easy to learn. I like the scanning it does for M365. We use Datto RMM for remote machine support. Huntress has a built-in component for Datto RMM that we can deploy immediately. I can push Huntress out to machines in about eight minutes. It does what it's supposed to do, which is amazing.
The tool is suitable for small to medium businesses. It monitors everything going on with their machines and their Microsoft 365 tenant if they have one. Even if they don't have their IT department, it can help flag issues.
The main benefit our customers see is the additional security Huntress provides. We've found that it reports many password files people save on their machines. For example, it might find a Word document full of passwords on someone's desktop. Just highlighting that this is happening is a valuable part of the service.
Previously, I had to go through all the alerts myself and figure out what was important and what wasn't. Now, my time is freed up to deal with the important alerts. I don't have to spend time finding what's important - it's already right before me.
It highlights when new mailbox rules are created in Microsoft 365, which helps us spot breached accounts. It also finds valuable password files on machines. This is one of the biggest security risks—if someone gets into a machine and finds a password file on the desktop, they can easily access things they shouldn't.
We could see the solution's benefits from the very first minute of its deployment.
What needs improvement?
I'd like it if Huntress could scan for software that's out of date or has open vulnerabilities. That would be useful for us. Scanning for vulnerable software would be helpful. Also, we've set it up to create a ticket in our ticketing system when there's an alert. It would be nice if closing that ticket would also close the Huntress alert. It doesn't do that right now, but they're working on adding that feature.
For how long have I used the solution?
I have been working with the product for a few months. We are a new customer.
Buyer's Guide
Huntress Managed EDR
September 2025

Learn what your peers think about Huntress Managed EDR. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
What do I think about the stability of the solution?
I haven't experienced any downtime.
What do I think about the scalability of the solution?
My company has around 1300 endpoints. The solution is scalable.
Which solution did I use previously and why did I switch?
We previously used SonicWall Capture Client for EDR. But it's not the same thing as Huntress. I don't think I could compare them. I'd say that Huntress is completely new in how we use it.
How was the initial setup?
Since we use Datto RMM, we just had to add their components and a secret key from our Huntress site. Then, when we deploy the agent, it communicates with the Huntress site, and all endpoints appear there. The whole process takes around 15 minutes.
It's not difficult to maintain. I've set it up so that if a machine hasn't reported to Huntress in 30 days, it automatically removes itself from our site. So, it maintains itself. I've also set up a recurring job to check that it's installed on all the machines it should be on.
What about the implementation team?
We did the deployment in-house.
What's my experience with pricing, setup cost, and licensing?
The solution is cheap compared to other alternatives. It offers good value for money. For the whole solution, it's up to about five pounds per device per month. Considering what it does, I think that's very good value.
Which other solutions did I evaluate?
We evaluated Seceon and eSentire. We chose Huntress because it was easy to deploy and does what we need it to do. eSentire seemed more hands-off, but with Huntress, we can handle the problems it flags ourselves. Seceon was hard to set up.
What other advice do I have?
If you are unsure about the solution, try to get a trial and see what it does. I rate it a ten out of ten.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP

Help Desk Engineer at Panurgy
It is affordable, powerful, and saves costs
Pros and Cons
- "The most valuable aspect of Huntress is its ability to isolate legacy systems from the network, preventing the spread of threats."
- "Ultimately, the clarity of their alerts is paramount for effective threat communication and could benefit from clearer remediation steps."
What is our primary use case?
Huntress is one of our security layers. We also use Webroot for antivirus and SentinelOne. Huntress is particularly valuable because when we first implemented it, we discovered several potential issues with our PCs that we were able to address quickly. More recently, it has allowed us to be notified immediately if something bad is happening.
We implemented Huntress to improve our security posture.
How has it helped my organization?
Last weekend, we experienced a potential breach prevented by Huntress' automated response. It involved the general manager at a car dealership who was unaware of an ongoing penetration test. This caused confusion until we contacted someone knowledgeable about the situation, allowing us to restore normalcy. This incident highlights the potential for serious consequences had the breach not been prevented.
Huntress is easy to use. The portal is transparent, and the manual or automatic remediation recommendations are well-defined.
It is a valuable addition to the SMB market. It is affordable and powerful.
Since we started using Huntress, things have become more automated. One valuable feature they recently introduced is a test mode, which allows us to gauge our response to a simulated emergency without triggering an actual alert.
Huntress' 24/7 monitoring is helpful. While it will alert us at all times, the alerts are usually important. The only low priority item is password alerting. When Huntress finds files that might have clear text passwords, it's not a high risk, but it's still good to inform the client about potential security issues.
The auto-remediation capabilities are excellent because they allow for a set it and forget it approach, or users can simply revisit the portal to verify that everything is as expected.
Huntress has helped reduce the need for expensive security tools and the hiring of security analysts. This can lead to savings equivalent to the cost of two security analysts, which is approximately $200,000 per year.
Huntress has improved our security. It generally doesn't interfere with our other tools, as sometimes our antivirus or some of the other tools tend to flag legitimate activities.
We have integrated Huntress with Webroot and SentinelOne. They each play a role in the security posture.
We noticed an improvement in our security within a few weeks. Of course, there were many things to handle, especially when rolling it out at a new location. We tend to clean up a little bit initially, which increases our workload slightly. But once we get through that initial phase, everything runs smoothly.
Huntress has saved us 20 percent in resources.
What is most valuable?
The most valuable aspect of Huntress is its ability to isolate legacy systems from the network, preventing the spread of threats. The automated remediation feature also provides significant value.
What needs improvement?
Huntress excels at explaining threats when they are presented in clear language. However, the sheer volume of threats and occasional ambiguity in remediation steps can make comprehensive tracking challenging. Ultimately, the clarity of their alerts is paramount for effective threat communication and could benefit from clearer remediation steps.
For how long have I used the solution?
I have been using Huntress for four years.
What do I think about the stability of the solution?
I would rate the stability of Huntress nine out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of Huntress eight out of ten.
How was the initial setup?
The initial deployment was done using a script, taking one day. We integrate it with ConnectWise to push scripts out to PCs and monitor the deployment to ensure continuous operation and services running. We receive alerts for this, making it maintenance-heavy but ultimately worthwhile.
Our deployment strategy was straightforward: set up the company, then implement and activate the scripts. I'm not heavily involved in deployments, but I've written a few scripts. When issues arise, like when our tool ThreatLocker halts a deployment, I step in to troubleshoot and resolve the problem.
What was our ROI?
Any prevention or early detection of an attack, like catching a cold before it spreads, will lead to significant savings in time, investment, and reputation. If we, as the Managed Service Provider, experience an exploit, it will negatively impact our reputation. Therefore, safeguarding our reputation is the best form of seeing a return on investment.
What other advice do I have?
I would rate Huntress nine out of ten. The services tend to stop, so we have a small script that restarts them. I don't know if there's a way they can make their service more resilient. That would reduce our maintenance burden.
We have 20 people that use Huntress in our organization.
We use Huntress on almost 25,000 devices.
Huntress requires minimal maintenance.
I would recommend Huntress to others. It lets you know about real-world attacks happening in near real-time. A couple of years ago, I remember Huntress alerted us about a laptop stolen at an airport, and we were able to isolate that laptop. It was eventually returned to the company, and they just had to call us to let us know. You can also turn off isolation, so it's not just a security feature, but it's almost like having LoJack for your laptop.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
Buyer's Guide
Huntress Managed EDR
September 2025

Learn what your peers think about Huntress Managed EDR. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Chief Security Officer at a computer software company with 51-200 employees
A great option for the SMB market, enhances visibility into endpoint activity, and reduces the effort needed for handling alerts
Pros and Cons
- "The most valuable aspect of Huntress is its 24/7 SOC service."
- "Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."
What is our primary use case?
We use Huntress to monitor our internal and customer systems for security vulnerabilities.
We chose Huntress for its 24/7 managed detection and response services.
Huntress is deployed entirely in the cloud. We use the Huntress portal to manage it and our RMM tool to distribute the agent to our devices.
How has it helped my organization?
Huntress is a great option for the SMB market. It's competitively priced and offers good value for the money, making it one of the most cost-effective security solutions available. Its team is highly qualified and delivers a quality product at a price point that fits the SMB budget. Enterprise tools can often be overly complex or expensive, and Huntress effectively addresses both of these concerns.
It's extremely easy overall. We deploy the agent and it takes care of the rest.
Huntress enhances visibility into endpoint activity by monitoring running processes. It employs a 24/7 human response team to analyze alerts from both the Huntress agent and Windows Defender Endpoint Protection. This team can then choose to isolate suspicious activity and limit its impact if deemed malicious, or escalate the case for further investigation.
Some endpoint protection solutions may miss early warning signs of suspicious activity, such as unusual system behavior or potential footholds for attackers. This is often the case when deploying such solutions to new customers. However, it's important to remember that malicious activity doesn't happen every day in every environment. So, for some customers, its value might not be immediately apparent. It might take a few years before a serious incident occurs, highlighting the need for Huntress' detection and response capabilities. Therefore, the timeframe to see the benefits of Huntress can vary greatly.
The fully managed service has certainly reduced the effort needed for handling alerts from endpoint protection solutions like Windows Defender. Eliminating the need to deal with false positives has been a significant benefit, greatly reducing our team's workload. Additionally, the SOC within the service effectively handles after-hours issues, minimizing the impact on our on-call staff.
Instead of relying on expensive endpoint protection software, we successfully leveraged the built-in Windows Defender in conjunction with the Huntress agent. This combination, in our opinion, represents a significant improvement over using a potentially more robust but costly solution alone. The key advantage lies in the added human element: Huntress' 24/7 monitoring and endpoint isolation capabilities. This approach has demonstrably improved our security posture. However, it's unclear whether it fully eliminates the need for a high-cost security analyst. While Huntress certainly reduces expenses associated with lower-level resources tasked with the initial triage of false positive alerts, its impact on the role of a specialized security analyst remains to be determined.
It has improved our overall security significantly. It adds another valuable layer of protection and provides greater visibility into endpoint activity. Perhaps the most significant benefit for us is the true 24/7 coverage. While our staff has extended hours, there's a gap overnight when no one is actively monitoring for security incidents. When time is of the essence, as it often is in cyber situations, having someone from Huntress available to instantly respond by isolating threats is invaluable. This service is certainly more cost-effective than attempting to staff our team for round-the-clock coverage.
Our security started improving immediately after deployment. It began searching for pre-existing footholds or remnants of other malware that may not have been fully cleaned up from previous infections. The 24/7 SOC provided instant benefits—knowing we had that extra layer of protection with dedicated experts watching our systems was a reassuring feeling.
What is most valuable?
The most valuable aspect of Huntress is its 24/7 SOC service. If something suspicious is seen on an endpoint, even in the middle of the night, there is always someone available to react quickly and isolate the endpoint to mitigate the potential spread to others.
What needs improvement?
Huntress' Process Insights feature could benefit from more robust search and filtering capabilities. Currently, it's quite basic, offering only a single search bar with limited granularity. Additionally, the data retention period is short, with access restricted to three days. While the SOC team can export a week's worth of data, extending this period to at least thirty days would be highly beneficial.
Overall, we're generally satisfied with the solution. However, deeper integration with other endpoint protection platforms would be valuable. Ideally, Huntress should be able to ingest alerts from systems like CrowdStrike and conduct investigations similar to CrowdStrike's offerings. This would be particularly useful for us as a CrowdStrike partner.
For how long have I used the solution?
I have been using Huntress for three years.
What do I think about the stability of the solution?
Last week, we encountered an issue with the Huntress agent. Essentially, there are two components: the core Huntress agent and the Rio agent, added later about a year into our partnership for process insights. While Rio is valuable, we experienced a communication gap regarding its functionality.
If Rio shut down for any reason e.g., computer reboot, or agent update, it wouldn't restart properly, creating a blind spot for the Hunter team as no data was transmitted. This issue emerged within the past two weeks and took a few days for Huntress to identify and resolve.
Overall, the platform is generally stable, but we've faced some bumps in the road. One issue involved unclear communication about agent check-ins, and the other was the recent Rio shutdown problem.
What do I think about the scalability of the solution?
Huntress scales very well. We've grown from approximately 9,000 to 17,000 endpoints, and I haven't encountered any scalability issues.
How are customer service and support?
We're generally very pleased with the technical support. They respond promptly via chat, and if the frontline team can't resolve an issue, they escalate it swiftly. In one instance, their SOC analysts even helped us investigate malicious activity at our endpoints, something that deeply concerned us and our customers. In that situation, they truly went above and beyond to assist us.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Webroot, but it was ineffective at stopping the latest ransomware threats. That was the main reason we switched to Huntress. We replaced Webroot with the built-in Windows Defender plus the Huntress agent, and together they proved significantly more effective at stopping those threats than Webroot alone.
How was the initial setup?
The initial deployment was smooth. However, we realized a gap in our internal processes and understanding of how to respond to different alert levels.
Our deployment was rushed due to signing the agreement during the Log4J vulnerability outbreak around Christmas 2020. The widespread threat forced us to prioritize deploying the Huntress agent quickly instead of following a slower, more deliberate approach to replacing Webroot.
Fortunately, the Huntress agent seamlessly integrates with other endpoint protection solutions. This allowed deployment without disrupting existing protection or leaving us vulnerable during the transition.
The additional 24/7 SOC visibility without replacing our current endpoint protection has been immensely valuable. While deployment was simple, we identified the need to refine internal processes and response protocols for different alert levels.
We had a small team, perhaps two or three people, working on the deployment. In all honesty, it could have been done by a single person. Our deployment process is streamlined, and we have a large customer base. As a mid-sized MSP with over two hundred customers at the time, we had the manpower to spare. However, thanks to scripting and RMM tools, even a single individual could theoretically deploy Huntress to a large number of endpoints with ease.
What about the implementation team?
Being an MSP, we implemented the solution internally.
What's my experience with pricing, setup cost, and licensing?
Huntress is priced fairly for the services and value it provides.
What other advice do I have?
I would rate Huntress nine out of ten.
Our team occasionally uses the automatic remediation feature for low-severity threats, but we don't heavily rely on it. When it comes to endpoint protection alerts, we prefer a more hands-on approach. Despite using automatic remediation to some extent, the feature's impact on our workload has been minimal.
The biggest maintenance challenge with Huntress is the potential for certain firewalls, especially Fortinet models depending on their enabled features, to block communication from the agent on the endpoint back to the Huntress portal. This blockage isn't apparent from the endpoint itself. While the Huntress page might appear installed and running, the agent might have only checked in initially and stopped sending data. After a month of inactivity, Huntress removes the agent to prevent the portal from becoming overloaded with inactive agents. This creates blind spots in our monitoring, as we remain unaware of the missing data. Addressing this challenge has been difficult, as we rely on our RMM tool for endpoint management and strive to maintain a consistent active list. Continuously comparing this list with the Huntress portal to ensure they match has proven frustrating.
When using Huntress the most crucial aspect is training our internal staff on how to respond to different alert levels. These levels typically fall into three categories: low, high, and critical. It's essential to have a clear action plan or standard operating procedure outlining how our team should handle each alert type. Additionally, basic training on the Huntress portal is recommended. The portal has various pages, modules, and tabs, so familiarizing our staff with navigating and interacting with it is crucial. This includes skills like isolating endpoints, removing isolation if necessary, and utilizing provided remediation tasks or manual remediation if preferred. Implementing these measures will significantly improve our incident response capability.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP
President at STRONGHOLD DATA, LLC
Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture
Pros and Cons
- "Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
- "I'd like Huntress to implement a component that can analyze network traffic for specific sites."
What is our primary use case?
Over the years, Huntress has gained many features, but initially, it was the foothold detection that drew us to the solution. It excels at uncovering persistent threats that evade other security measures. Our staff often compares it to a baseball backstop: you might not hit every pitch, and the catcher might miss a ball, but the backstop is there to prevent a disaster. In the same way, Huntress acts as a safety net, a team of experts searching for threats that slip past other security layers.
We observed threat actors continually refining their attack methods against the managed endpoints of our diverse clientele. We sought a security tool that avoided exaggerated claims of absolute protection. We understand that perfect security doesn't exist. Instead, we prioritized finding a partner with integrity and a genuine commitment to the SMB security mission, both for our clients and the broader community. Even before becoming an investor and customer, Huntress impressed us with their educational approach. They actively engage the MSP community, providing valuable knowledge, training, and insights into current threats. Their focus on raising security awareness before securing contracts resonated deeply with us. We admire their company culture and approach.
Our client base presents a mixed deployment landscape. Some, particularly those in manufacturing, maintain significant on-premises infrastructure. In contrast, others have fully embraced the cloud and haven't adopted serverless technologies like the ones we offer. Therefore, our platform must cater to this diverse range of deployment models.
How has it helped my organization?
Huntress was likely the easiest tool we've ever deployed. It's low-touch, and we didn't anticipate any problems. The worst-case scenario would be an issue with their internet connection, but otherwise, it requires minimal interaction with the machines. Users are unaware of its background operation; it doesn't make changes or enforce rules initially, making the rollout very smooth. We even deployed it internally before broader implementation to familiarize ourselves and ensure it wouldn't cause any harm. My confidence stemmed from its ease of use and the high quality of its product.
It is a cost-effective solution for the SMB market. It allows us to keep our costs competitive while ensuring optimal protection for our clients. Additionally, it instills a sense of quality and reliability in our operations. After all, we are human, and mistakes are inevitable. Huntress provides peace of mind for the MSP side by helping us mitigate those potential oversights.
We observed the benefits of Huntress within the first two weeks of deployment. We discovered several previously unknown aspects of the managed environment. Subsequently, after implementing the change to simply push them out of their base stack, we were able to quickly identify well-responding machines, those requiring attention, and malfunctioning Wi-Fi protection. This process effectively illuminated areas requiring improvement from a management perspective.
The fact that the Huntress system is managed 24/7/365 is extremely helpful for our workloads. Our staff typically works from seven in the morning to five in the afternoon, so there's only a small overlap with Huntress' coverage. However, we greatly benefit from them keeping an eye on things and being able to alert us in the middle of the night if something suspicious happens. We're very thankful for their round-the-clock monitoring, as it saves us from having to keep our staff up late or hire additional workers for overnight hours. This, in turn, saves us money on labor costs.
There’s a feature that allows us to automatically remediate low-severity threats, and we have enabled it for certain clients. This feature has significantly reduced the number of minor issues that our SOC team would usually deal with, freeing them to focus on higher-level threats and more strategic tasks.
Huntress has significantly improved our security posture. Their team provides exceptional vigilance, staying informed about emerging threats and tracking the tactics of bad actors. We've seen numerous instances where they've detected threats just as they activated. In some cases, we simply isolated the affected machine, while in others it didn't require such immediate action. Remarkably, a month later, the FBI contacted us to inquire about one of these potential threats. Fortunately, thanks to Huntress' swift intervention, there was no actual danger. This experience highlights their cutting-edge expertise, not just in technology, but also in understanding the evolving tactics of cybercriminals. They consistently stay ahead of the curve, or at least keep pace with, the ever-changing threat landscape.
Huntress helps to reduce the need for expensive security tools and analysts. We have a superior base layer compared to just offering a standalone product. While it is a tool, it's also a product and service that includes access to the Huntress team's expertise. Their threat operations team monitors potential threats, so we don't need to dedicate our own time and resources to analyzing logs and information. They essentially do it for us.
Finding cost-effective security partners is crucial, as we navigate competing demands. Some clients expect high effectiveness and demonstrably high value, while other vendor tools see rising costs. It's key to identify partners who deliver demonstrably good value for our investment, maximizing our effectiveness through optimized time and resource allocation.
We begin to see improvements in our company's security within two days of deployment. Pushing the installation requires minimal effort. Typically, suspicious activity becomes apparent within the first 24 to 48 hours, which the system highlights immediately. After a week or two, the system learns usage patterns and adapts to the environment, providing us with a comprehensive understanding of our security posture. By then, we've proactively addressed any identified issues, resulting in a swift and efficient security monitoring process.
What is most valuable?
Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients. However, what truly convinced us to make it a core part of our security stack, instead of just deploying it selectively based on specific needs, was Huntress' introduction of Managed AV. This allowed us to replace our basic antivirus solution often Windows Defender for our predominantly Windows environment with a more robust option managed by Huntress. Managed AV essentially made Huntress our new baseline antivirus, replacing Windows Defender, while still allowing us to utilize premium solutions like SentinelOne for specific situations. Ultimately, this shift enabled us to expand our footprint from around 400-500 machines to an impressive 4,600.
What needs improvement?
I'd like Huntress to implement a component that can analyze network traffic for specific sites. This involves deploying network sensors that monitor beyond just endpoint data, which they currently gather, and identity information through their 365 integration. This additional layer would offer site-level visibility, allowing us to detect suspicious traffic even on devices where the Huntress endpoint agent can't be installed. For example, in manufacturing environments, network devices and IoT devices might not be compatible with the agent. Comprehensive site-wide visibility would significantly enhance our security posture.
For how long have I used the solution?
I have been using Huntress for around four years.
What do I think about the stability of the solution?
Huntress is stable. We have not encountered any issues.
What do I think about the scalability of the solution?
Easy scalability that requires minimal time investment from us. Their platform readily handles our needs.
How are customer service and support?
We've been using their service for years now with minimal technical issues. However, I've contacted their technical support several times, usually regarding security-related alerts. In some cases, it was a matter of needing clarification, while other times we simply couldn't find the relevant documentation. We wanted additional information about these alerts to improve our understanding and prevent future issues. Sometimes they get busy and their response time is slow but the quality of their service is great.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we used a variety of security solutions, but none specifically addressed the gap where users require items to be forwarded to other security layers. We solely relied on antivirus software or various EDR solutions at the time. We simply made the most of those tools available. Huntress did replace antivirus programs like Bitdefender and Webroot for us. Because we could utilize Managed AV, we no longer needed those other products. In that sense, it did take their place. However, Huntress entered the market to fill a previously unmet need and created a new market segment.
How was the initial setup?
The initial deployment was smooth, even when we encountered some misalignments between our expectations and reality, or when we had to adjust initial assumptions. Fortunately, we were able to rectify these issues quickly by modifying the agents. For example, if an agent was assigned to the wrong client, we could make a prompt correction.
Overall, the deployment was very straightforward thanks to the ease of using PowerShell. The developers did a fantastic job making the process as user-friendly as possible.
One person was required for the deployment.
What about the implementation team?
We handled the deployment internally, leveraging our existing RMM tool which already manages and deploys other software.
What was our ROI?
Huntress boasts a high return on investment. This translates to needing fewer staff dedicated to analyzing security tools, which is a significant benefit for us. Consequently, labor costs associated with incident monitoring decrease. Additionally, it provides a dedicated Security Operations Center team that continuously monitors for threats. Essentially, it's like getting two solutions for the price of one. I imagine the reduction in personnel costs would at least cover half the expense of incident investigation and response, which are typically more costly with other solutions. Overall, the ROI from Huntress is evident in our daily operations. The peace of mind and improved sleep Huntress brings are invaluable.
What's my experience with pricing, setup cost, and licensing?
While other options have emerged since Huntress' arrival, I believe it still offers the best value for the features and services it provides.
Which other solutions did I evaluate?
Many alternative security solutions originated from the enterprise market, resulting in high pricing that didn't fit our MSP pricing model for smaller clients. Additionally, while existing antivirus vendors offered bolted-on MSP options, standalone SOC services often lacked cost-effective models per endpoint. At the time, nothing quite like Huntress existed in the market.
What other advice do I have?
I would rate Huntress ten out of ten.
Huntress is doing exactly what we need. However, we haven't fully explored its potential for expansion. Previously, my main request was Microsoft 365 integration, which they are now working on. We're currently conducting some early pilot tests with it. In essence, that integration addressed the major gap I identified.
Most multi-tenant tools involve a dashboard, user interface, and the ability to create sub-organizations or child accounts. Each child account has access to all purchased products under its parent account. The key requirement is ensuring machines are accurately tagged to their respective companies. While infrequent, maintaining these tags involves verifying their correctness and fixing minor issues, such as typos or inconsistencies. This applies to most multi-tenant tools, not specific to Huntress. However, Huntress simplifies this process compared to other solutions. Unlike requiring uninstallation or redeployment in other tools, Huntress allows seamless correction and movement of tagged machines, minimizing errors and streamlining management.
As long as we understand the platform's capabilities and the value it provides, we can avoid any misconceptions. I believe many MSPs tend to get overly excited about any new tool. We've faced similar challenges in the past, so it's crucial to remember that this isn't a "deploy and forget" solution. While the platform simplifies the process significantly, some effort is still required on our end to ensure proper configuration before deployment. It's more of a "set it and manage" tool compared to the others we use. Therefore, understanding the product, its position in our security stack, and how it complements existing tools is essential. We need to know how to explain its role and support it effectively for our clients. That's the key takeaway. Knowing its place in the security stack is fundamental.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
President at I Divide By Zero Technical Services
Integrates seamlessly with RMM, making it easy to roll out and use
Pros and Cons
- "After deployment, it takes some time to scan and process everything. Huntress has effectively flagged issues such as password files on desktops, which it identifies as low-level alerts. It also handles more significant threats effectively."
- "I had been requesting Huntress support for macOS for a while, and they recently rolled it out, making it generally available within two months. Having a regular support line would be good."
What is our primary use case?
It integrates seamlessly with RMM, making it easy to roll out and use. Many fixes are automated, so you can approve them and let the system handle them, avoiding the need to go through individual steps. If something serious comes up, they proactively make phone calls and lock things down in advance. It simplifies my job rather than adding it.
How has it helped my organization?
It has improved my organization by making things easier.
What is most valuable?
After deployment, it takes some time to scan and process everything. Huntress has effectively flagged issues such as password files on desktops, which it identifies as low-level alerts. It also handles more significant threats effectively. The system runs in the background and uses sample files to detect ransomware attacks quickly. If an attack occurs, Huntress can isolate the affected machine promptly. We noticed benefits and problem-solving capabilities within the first week.
What needs improvement?
I had been requesting Huntress support for macOS for a while, and they recently rolled it out, making it generally available within two months. Having a regular support line would be good.
For how long have I used the solution?
I have been using Huntress for a year and a half or two.
What do I think about the stability of the solution?
There are no issues with stability.
What do I think about the scalability of the solution?
This solution is used by 400 machines. It scales independently. When we add clients to our RMM, the script runs every night and automatically adds Huntress to the new clients and their machines.
How are customer service and support?
Support was quick. They made it easy for us to get assistance when needed. They responded promptly to our inquiries about upcoming products and provided timely support to get things rolling. We were tweaking our scripts, and they directed us to their repository of scripts and resources. When I encountered an issue, they suggested hopping on a call to walk me through it rather than just relying on chat. They resolved the issue relatively quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Huntress provided ease of use and a lower spend. The sales team was supportive throughout the process, not just during the initial setup. They helped with scripting and ensured we were fully operational before stepping back, which made things much easier for me.
How was the initial setup?
What's my experience with pricing, setup cost, and licensing?
The pricing is great.
What other advice do I have?
Their minimum spend is quite low, unlike some vendors that require $500 or $1,000 a month. It's around $50, so you can start with just a few clients if you're new or scale up if you're larger. Their products integrate well with our existing systems and perform effectively.
I’ve worked with some vendors whose implementations were so complex that managing the solution required almost a full-time person. In contrast, Huntress was straightforward to deploy. You set a few permissions, and then it just runs in the background. This simplified things and made managing the software much easier.
Huntress is largely set-it-and-forget-it. The only real maintenance involves handling remediation for attacked machines rather than ongoing upkeep. The recent addition of Mac support required a new script.
Overall, I rate the solution a ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
Founder / Director at CX consulting
Great for SMBs and has excellent customer support
Pros and Cons
- "Users usually note improvements in a matter of days. In others, it is immediately. It varies according to the environment."
- "It would be ideal if they could create some incentives to help more partners get clients to onboard it."
What is our primary use case?
We're a Huntress partner. It's being used by certain clients as an alternative to mainstream EDRs.
How has it helped my organization?
The feature that I like about Huntress, which I have not seen with any other solution, is the proactive incident checking. The team flags certain potential malicious incidents. The ease of use regarding implementation has also been great.
Overall, Huntress ensures a better cyber security posture. It provides a good baseline for security. Having the peace of mind that you have a decent set of guys or a team behind you is excellent.
What is most valuable?
The solution's simplicity, ease of implementation, and thoroughness are all valuable aspects. It doesn't put a heavy load on endpoints.
Huntress has good support.
It's a solid solution. For SMEs, it is an extremely good solution to have.
It has behavioral-based algorithms. Having that peace of mind that you actually have a group of experienced SOC analysts who are there watching is helpful. I don't have to be there to attend to the potential incidents straightaway 24/7. It takes a strain off of the partner company. As a user, you can actually go and rest and have a fairly peaceful weekend. If something happens, you have a good, solid team behind you that will attend to any potential threats that pop up over the weekend or any given day.
Of all the different solutions I work with, Huntress is one of the easiest.
As a partner, Huntress is useful for the SMB market. It integrates with Microsoft Defender and it really makes things so much easier. It offers a single glass pane, and you can see exactly what's happening.
We had one incident, where a user was trying to click on a potential malicious link. However, the processes were fairly quickly identified, and everything was killed literally within a couple of seconds. That incident was very effectively stopped.
The fact that the solution is fully managed by Huntress 24/7 frees up quite a lot of time from a technical point of view. We don't have to, first of all, employ a local resource. The potential local resources that were available, they can now just look at maybe assisting with some of the alerts. With Huntress, now they have time available to perform other tasks. Also, we're now a bit more proactive than reactive. We're likely saving 50% to 60% of our time.
We make use of Huntress' ability to automatically remediate low-severity threats. That automatic automated remediation has positively affected workloads and security. With any type of automation, you free up time. You also know that once there's an incident, certain steps have already been taken. The technician will be able to see if some of the mundane tasks have already been performed, and that way, they don't have to waste time redoing those.
Using Huntress helped reduce the need for expensive security tools or hiring expensive security analysts for our clients.
Huntress affected the overall security of our clients. It provides a good layer of security. Security is a layered approach.
Users usually note improvements in a matter of days. In others, it is immediate. It varies according to the environment.
Huntress utilizes AI in a very clever way, especially on the behavioral-based level. Typical attacks don't always utilize the old traditional signature-based attacks. They utilize it quite effectively.
What needs improvement?
The pricing could always be lower, however, it already is good value for money.
It would be ideal if they could create some incentives to help more partners get clients to onboard it.
They should grow their market and spend a bit more time and effort on South Africa.
For how long have I used the solution?
I've been using the solution for three years.
What do I think about the stability of the solution?
The solution is stable. Aside from some occasional general maintenance, it's great. I'd rate it ten out of ten.
What do I think about the scalability of the solution?
We have clients that range from three users to up to 65.
I'd rate scalability eight out of ten.
How are customer service and support?
They offer very good support. It's a simple email away. The responses are great. In a nutshell, you know you have a company that backs you as a partner. They are proactive.
Support is superb. I can't complain. It's effective. It's quick. The turnaround time on submitting complaints is very, very quick. If I report something today, maybe by tomorrow someone will revert.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've worked with various solutions, including SentinelOne and Acronis.
From a deployment point of view and from a configuration setup point of view, Huntress is just easier. It's simplistic. The rate of false positives for reporting is much less, in my experience. It's just a much easier product to use.
How was the initial setup?
The deployment is pretty straightforward. It's literally a couple of minutes per client. The integrations make it simple.
We've got seven people dedicated to working with the solution.
There isn't really any maintenance. Once it's set up and configured, the agents ensure that it is updated on a regular basis. If they do not update, for some reason or other, you are warned about it.
What's my experience with pricing, setup cost, and licensing?
It's reasonably priced. The pricing is very competitive.
From the point of view where small businesses cannot afford a full stack, Huntress provides a basic solution where your threats are taken care of with the awareness training that's attached. If you are looking for something very basic to put in place, it's very good value for money.
I'd rate the pricing six out of ten. However, there are a whole lot of other factors that you need to look at when you purchase a solution. You need to look at not just the product. You need to look at the team behind the product. You need to look at effectiveness. You need to look at after-sales support, et cetera. In general, they are fairly inexpensive and very competitive. Even if they would bump up their prices a little bit, they are a decent solution to look at.
They are worth the investment.
What other advice do I have?
I'd recommend the solution to others. From value for money to ease of implementation to minimal false positives, it's great. You get peace of mind that you know that you've got someone that actually looks after you.
I'd rate the solution ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
COO at a tech services company with 11-50 employees
Reduced triage time, great support, and good price for MSPs
Pros and Cons
- "It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry."
- "Their EDR can have increased coverage for Macintosh. They do not fully secure Macintosh computers."
What is our primary use case?
We use their EDR platform and their MDR platform. By implementing Huntress, we wanted to add another layer of security to our workstations across all of our clients.
How has it helped my organization?
Threat protection on the endpoints and great customer support are some of the benefits. There is a great vendor relationship. We could see its benefits pretty immediately. They work well with you. They are very attentive, and they make sure that their partners get whatever support they need.
It has reduced the triage time. When they do find an alert or an issue, many times, they post an accurate resolution, so my technicians do not have to investigate to determine a resolution. It is already outlined for them.
Huntress has the ability to automatically remediate low-severity threats. We use this feature in some cases and not in all cases. It works well when we have used it. It has impacted our workload and security. The faster you can fix the security issue, the better off you are.
Using Huntress has helped reduce the need for expensive security tools or to hire expensive security analysts. It is important. It is hard to maintain a security staff.
We are much more secure today than before starting to use Huntress.
What is most valuable?
It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry.
What needs improvement?
Their EDR can have increased coverage for Macintosh. They do not fully secure Macintosh computers.
For how long have I used the solution?
We started with them at least four years ago.
What do I think about the stability of the solution?
I have not seen any stability-related issues so far.
What do I think about the scalability of the solution?
It is very scalable.
How are customer service and support?
They are very good. They are very fast to respond, especially in emergencies. They have great support. I would rate them a 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using Bitdefender. We switched because Huntress was more comprehensive and had 24/7 SOC.
How was the initial setup?
We use their cloud portal, and we deploy from there. I was involved in the initial vetting of the product and the vendor, but I was not involved in doing the installation.
In terms of maintenance, when updates need to be pushed out, we make sure that they are pushed out. They normally get installed automatically. We have a tech person who daily makes sure that everything is okay in the portal. There is no real maintenance. There is nothing that we would not do for any other vendor.
What was our ROI?
After deploying Huntress, we could immediately see improvements in our organization's security.
What's my experience with pricing, setup cost, and licensing?
It works well for an MSP.
Which other solutions did I evaluate?
We evaluated Blackpoint Cyber and SentinelOne. We chose Huntress just because of what they offered. Blackpoint Cyber and SentinelOne are great products. It was a hard decision between the three, but we chose Huntress.
What other advice do I have?
Those evaluating this solution can research it online. They can ask their peers or just contact Huntress. They will guide them through the whole process.
I would rate Huntress a 10 out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
Cyber Security Analyst at Apex Computing Services Ltd
Effective security management reduces workload and operational expenses
Pros and Cons
- "The most valuable features of Huntress Managed EDR include the SIEM and the log ingestion from firewalls; it has been really effective for managing our security. Huntress Managed EDR has positively impacted my organization by significantly reducing tickets coming to the SOC team; we have seen far less noise in terms of tickets since its implementation."
- "There are some drawbacks in Huntress Managed EDR, particularly with the security awareness training aspect which is more manual than expected compared to something like KnowBe4."
What is our primary use case?
We use Huntress Managed EDR as part of our tech offering for enhanced security, especially for small and medium businesses.
What is most valuable?
The most valuable features of Huntress Managed EDR include the SIEM and the log ingestion from firewalls; it has been really effective for managing our security. Huntress Managed EDR has positively impacted my organization by significantly reducing tickets coming to the SOC team; we have seen far less noise in terms of tickets since its implementation.
What needs improvement?
There are some drawbacks in Huntress Managed EDR, particularly with the security awareness training aspect which is more manual than expected compared to something like KnowBe4.
It could be improved in terms of campaign setup in the security awareness training section of Huntress Managed EDR. The campaign setup in Huntress Managed EDR could be easier, as it requires more manual configuration than anticipated.
How are customer service and support?
Their technical support is reliable and effective.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have previously used SentinelOne and Blackpoint before Huntress Managed EDR.
How was the initial setup?
I was personally involved in the deployment process of Huntress Managed EDR.
What was our ROI?
Using Huntress Managed EDR has indeed reduced the need for expensive security tools or the hiring of additional expensive security analysts. Without Huntress Managed EDR, we would face much higher operational expenses.
Which other solutions did I evaluate?
SentinelOne does achieve similar security goals, but Huntress Managed EDR has less noise, while Blackpoint doesn't operate at the same level as Huntress or SentinelOne. The difference between Huntress Managed EDR and Blackpoint's SOC team is that Huntress is more responsive, providing detailed reports and helpful guidance.
What other advice do I have?
I combine Huntress Managed EDR with Capture Client, which is a mixture of Windows Defender and SonicWall Capture Client as our EDR. I am satisfied with how the automatic remediation in Huntress Managed EDR works; it has been helpful. I'm pretty satisfied with their work.
Huntress Managed EDR is pretty easy to use once you're familiar with what it does and have access to it.
We are an MSP, so we use Huntress Managed EDR internally as well as for our customers that we support. After deploying Huntress Managed EDR, I saw almost instant improvement in our organization's security, specifically with a significant cut down in SOC tickets.
We make use of Huntress Managed EDR's ability to automatically remediate low-severity threats. The automatic remediation in Huntress Managed EDR has been very helpful for our workload and security.
My overall rating for Huntress Managed EDR would be about eight and a half, almost nine.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Aug 12, 2025
Flag as inappropriate
Buyer's Guide
Download our free Huntress Managed EDR Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
IBM Security QRadar
Microsoft Defender XDR
HP Wolf Security
Elastic Security
WatchGuard Firebox
Check Point Harmony Endpoint
CrowdStrike Falcon Complete MDR
Rapid7 InsightIDR
Intercept X Endpoint
Buyer's Guide
Download our free Huntress Managed EDR Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How do you estimate ROI of a Managed Detection and Response (MDR) solution?
- When evaluating Managed Detection and Response (MDR), what aspect do you think is the most important to look for?
- Which solution do you prefer: Optiv Managed Security Services or eSentire?
- Why is Managed Detection and Response (MDR) important for companies?