Product Avatar Image

Huntress Labs

Show rating breakdown
897 reviews
  • 4 profiles
  • 5 categories
Average star rating
4.8
#1 in 2 categories
Grid® leader
Serving customers since
2015
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Huntress Managed EDR

716 reviews

The Huntress Managed Security Platform combines automated detection with human threat hunters—providing the software and expertise needed to stop advanced attacks.

Product Avatar Image
Huntress Managed Security Awareness Training

154 reviews

Ready your teams with memorable, engaging, and story-based content. Huntress security experts design lessons using the real-world threats we see every day in our SOC, so you can identify attacks and keep your organization safe. Our training works for businesses of any size and for users of any technical expertise.

Product Avatar Image
Huntress Managed ITDR

33 reviews

Continuously monitors for indications and behaviors of a BEC attack, like a user logging in from a suspicious location or a malicious email forwarding rule. The Huntress Security Operations Center (SOC) reviews any detections, instantly isolating any compromised identities, and supplies a semi-automated remediation plan for further necessary actions.

Product Avatar Image
Huntress Managed SIEM

0 reviews

Huntress Managed SIEM was built from the ground up to solve the problem of data overload, unfiltered sources, and alert fatigue. Our Managed SIEM redefines the industry standard by applying Smart Filtering capabilities at the log source to only capture threat-specific logs. This simplifies the workload toward threat discovery and data retention. Managed SIEM is also built to collect Windows-based events and syslog using the same proprietary agent you’re familiar with. Supported by our AWS backend, your data is stored, safely and reliably.

Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

Global Learning Systems

27 reviews

Product Description

GLS offers a full range of end-to-end learning and development services in-house. As evidenced by our work in similar projects, GLS has the base of talent and experience needed to successfully manage all aspects of world-wide enterprise deployment for your learning program.

Profile Name

Star Rating

816
77
6
1
3

Huntress Labs Reviews

Review Filters
Profile Name
Star Rating
816
77
6
1
3
Travis H.
TH
Travis H.
Technical Services Manager at Proactive Data
11/14/2024
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

A Tale of 2 MDR

I love the ease of use and how easy it was to integrate with our PSA and RMM platforms. For such a feature rich platform it is very cost ffective.
Henry B.
HB
Henry B.
Computer Technician at We Know I.T.
11/14/2024
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Huntress have my back

Few false positives, timely alerts and guide to remedial action.
HA
Halion A.
11/14/2024
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Huntress should just take over all security for all things

easy to deploy, integrates with other huntress products. Support is great if you actually have an issue.

About

Contact

HQ Location:
Ellicott City, US

Social

@HuntressLabs

What is Huntress Labs?

Protect Your Endpoints, Identities, Logs, and Employees.The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 4/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against today’s cyberthreats. As long as hackers keep hacking, we keep hunting.

Details

Year Founded
2015