Huntress Labs Reviews & Product Details

Huntress Labs Overview

What is Huntress Labs?

The endpoint detection and remediation market is a crowded space with several great options for large organizations. However, most require analysts with security expertise, only integrate with enterprise products, and come at a steep price point.

Huntress Labs Details
Product Description

The endpoint detection and remediation market is a crowded space with several great options for large organizations. However, most require analysts with security expertise, only integrate with enterprise products, and come at a steep price point.


Seller Details
Seller
Huntress Labs
Company Website
Twitter
@HuntressLabs
5,639 Twitter followers
Show More
Answer a few questions to help the Huntress Labs community
Have you used Huntress Labs before?
Yes

Huntress Labs Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 4 Huntress Labs reviews
Showing 4 reviews
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
All Industries
Region
Already have Huntress Labs?
Write a Review
AI
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: Invitation from G2
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best?

The product works well and there is very little configuration required. Simply install the agent and you system is protected from a myriad of threats. Most issues are resolved without requiring any user interaction. Support is great and the product team regularly hosts some of the best security focused webinars that I have seen. Review collected by and hosted on G2.com.

What do you dislike?

As a technical-minded person, it would be great to know some of what is happening behind the scenes, what is used to scan for, detect and resolve threats. I do realize that disclosing too much information could put the company in a competitive disadvantage, so I do not consider this a serious issue. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

If you would like an additional layer of protection from Cyber threats with the need to spend a lot of time on configuration and maintenance, Huntress is a good purchase. Be sure to attend webinars hosted by Huntress Labs as thy are some of the best that I have attended. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

You can never have enough layers of protection from cyber-security threats. Huntress works in addition to tradition Antivirus and gives us additional peace of mind that all manages systems are protect from threats. Because issues are resolved by Huntress's team, when necessary, we do not need to spend employee time resolving threats. Review collected by and hosted on G2.com.

Show More
Show Less
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: Organic
What do you like best?

Nothing. It was a complete disappointment. Review collected by and hosted on G2.com.

What do you dislike?

Their professionalism. I came to them at a technical level and they got defensive. They talk a good talk and their salesperson is pushy. was immediately sent a defensive email with a negative tone from a Dave Kleinatland, a Senior Security Engineer. Explained what I was doing - no reply. He eventually responded and I explained I was still conducting testing and by the time I needed to engage with back for answers/clarity from Huntress my trial had expired and needed to speak with their VP of Sales, Andrew Kaiser. Followed up several times with no response. I even reached out to their CEO Kyle Hanslovan (whom I had previous conversations with) and no response or acknowledgment. I truly don't see how they provide value to their customers. As they say - "Their software does not prevent any attacks" - so why do MSP's use it? I strongly urge MSPs looking into Huntress Labs to carefully evaluate them. Make sure you aren't wasting money by paying them. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

Don't use them. Might as well go light your money on fire. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Can't solve anything if they don't respond to you. Review collected by and hosted on G2.com.

Show More
Show Less
AI
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: Organic
What do you like best?

The fact that we get a detailed guide on neutralizing a security threat... even if AV misses something Review collected by and hosted on G2.com.

What do you dislike?

Not much I dislike currently. Everything about this product works as intended Review collected by and hosted on G2.com.

Recommendations to others considering the product:

Understand this is a remediation tool, not antivirus. Meaning it doesn’t actively block threats, it detects them and then sends to them to provide a full remediation walkthrough. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

No problems have been found yet. Benefits come in the obvious added security. Review collected by and hosted on G2.com.

Show More
Show Less
UC
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Invitation from the seller
What do you like best?

I love the fact that they have real people proactively monitoring all potential breach activity and will contact you when needed. Review collected by and hosted on G2.com.

What do you dislike?

There is nothing that I can think of at this point. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

I would hight recommend that you give this company a shot. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Proactive monitoring of potential security breaches. Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Huntress Labs for G2 to provide buying insight. Below are some alternatives with more reviews:

1
MVISION Endpoint Security Logo
MVISION Endpoint Security
4.3
(161)
McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment.
2
Sophos Intercept X: Next-Gen Endpoint Logo
Sophos Intercept X: Next-Gen Endpoint
4.3
(127)
Complete security that includes encryption, web filtering and patch assessment
3
SolarWinds N-central Logo
SolarWinds N-central
4.3
(107)
As networks grow in complexity and scale to thousands or tens of thousands of devices, IT service providers need powerful tools to help them keep up. SolarWinds N-central gives you that power.
4
SolarWinds Remote Monitoring & Management Logo
SolarWinds Remote Monitoring & Management
4.2
(107)
Powerful, flexible, and scalable remote monitoring and management tool for IT service providers and MSPs, available through either cloud or on-premises delivery. SolarWinds Remote Monitoring & Management empowers you to manage, monitor and secure your network from within a unified web-based console. This RMM offers a comprehensive suite of best-in-class security services delivered as part of a single integrated platform.
5
SentinelOne Endpoint Protection Platform Logo
SentinelOne Endpoint Protection Platform
4.8
(51)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
6
WatchGuard Endpoint Security (formerly Panda Security) Logo
WatchGuard Endpoint Security (formerly Panda Security)
4.3
(85)
Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.
7
Carbon Black EDR Logo
Carbon Black EDR
4.4
(55)
CB Response is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.
8
BlackBerry Protect Logo
BlackBerry Protect
4.2
(37)
BlackBerry Protect redefines what antivirus can and should do for your organization by leveraging artificial intelligence to detect AND prevent malware from executing on your endpoints in real time.
9
Bitdefender GravityZone Logo
Bitdefender GravityZone
4.1
(34)
Bitdefender GravityZone combines all the security services organizations need into a single delivery platform to reduce their cost of building a trusted environment for all endpoints.
10
Cortex XDR Logo
Cortex XDR
4.7
(32)
Traditional antivirus (AV) is not the solution to endpoint security – it’s the problem. AV can no longer stop today’s threats. Traps™ advanced endpoint protection is the only product offering that replaces AV with “multi-method prevention”: a proprietary combination of malware and exploit prevention methods that pre-emptively block both known and unknown threats
Show More