Best Software for 2025 is now live!
Product Avatar Image

Huntress Labs

Show rating breakdown
897 reviews
  • 4 profiles
  • 5 categories
Average star rating
4.8
#1 in 2 categories
Grid® leader
Serving customers since
2015
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Huntress Managed EDR

716 reviews

The Huntress Managed Security Platform combines automated detection with human threat hunters—providing the software and expertise needed to stop advanced attacks.

Product Avatar Image
Huntress Managed Security Awareness Training

154 reviews

Ready your teams with memorable, engaging, and story-based content. Huntress security experts design lessons using the real-world threats we see every day in our SOC, so you can identify attacks and keep your organization safe. Our training works for businesses of any size and for users of any technical expertise.

Product Avatar Image
Huntress Managed ITDR

33 reviews

Continuously monitors for indications and behaviors of a BEC attack, like a user logging in from a suspicious location or a malicious email forwarding rule. The Huntress Security Operations Center (SOC) reviews any detections, instantly isolating any compromised identities, and supplies a semi-automated remediation plan for further necessary actions.

Product Avatar Image
Huntress Managed SIEM

0 reviews

Huntress Managed SIEM was built from the ground up to solve the problem of data overload, unfiltered sources, and alert fatigue. Our Managed SIEM redefines the industry standard by applying Smart Filtering capabilities at the log source to only capture threat-specific logs. This simplifies the workload toward threat discovery and data retention. Managed SIEM is also built to collect Windows-based events and syslog using the same proprietary agent you’re familiar with. Supported by our AWS backend, your data is stored, safely and reliably.

Profile Name

Star Rating

816
77
6
1
3

Huntress Labs Reviews

Review Filters
Profile Name
Star Rating
816
77
6
1
3
JH
Jeremy H.
12/17/2024
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Great product, even better company!

The data output is simple, clearly labeled, and makes sense. The remedation steps they provide are helpful and give insight to what they look for and need to do to clean up malicious data.
Julio L.
JL
Julio L.
Experiencia en manejo de Office 365, Datto RMM, Pruebas de software, resolucion de cualquier tipo de problema en Windows OS.
12/16/2024
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Excellent EDR

The interface is pretty easy to use and also offers auto-remediation options. EDR Tamper Protection was a new addition to the features this year Good integration with my other systems - Autotask
DH
Devon H.
12/16/2024
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Solid Product, Even Better People

The people and process that drive this company are what make the product GREAT!. Knowing that there are some of the brightest cybersecurity minds in the world watching our endpoints gives us peace of mind and the sleep at night factor. Host isolation is rock solid and fast. Visibility into activity accross our network is simple and easy to understand. Deployment of the product is seemless and requires little techincal skill.

About

Contact

HQ Location:
Ellicott City, US

Social

@HuntressLabs

What is Huntress Labs?

Protect Your Endpoints, Identities, Logs, and Employees.The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 4/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against today’s cyberthreats. As long as hackers keep hacking, we keep hunting.

Details

Year Founded
2015