  # Best Managed Detection and Response (MDR)  Software for Small Business

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Products classified in the overall Managed Detection and Response (MDR) category are similar in many regards and help companies of all sizes solve their business problems. However, small business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Small Business Managed Detection and Response (MDR) to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Small Business Managed Detection and Response (MDR) category.

In addition to qualifying for inclusion in the Managed Detection and Response (MDR) Software category, to qualify for inclusion in the Small Business Managed Detection and Response (MDR) Software category, a product must have at least 10 reviews left by a reviewer from a small business.




  
## Category Overview

**Total Products under this Category:** 126

  
## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 8,700+ Authentic Reviews
- 126+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
  
---

**Sponsored**

### Deepwatch

Deepwatch is the leader in Precision MDR powered by AI and humans. We amplify human expertise with AI insights to reduce the risks that matter most to your business. Unlike one-size-fits-all MDR, Deepwatch delivers protection that is comprehensive, custom, clear, and ceaseless—stopping threats before and after they emerge with tailored responses at every step. Deepwatch is tuned to each customer’s environment, trained on their priorities and the stack they’ve invested in to strengthen defenses and focus on what matters most. There are no black boxes—customers get clarity on every detection, decision, and data source, along with the name of the analyst behind it. Around-the-clock protection is delivered by security experts who act on real-time threats, powered by AI. Visit Deepwatch.com. Always Watching. Always Protecting. Deepwatch is: - Named to CRNs 2025 Security 100 List - Global INFOSEC Awards Winner 2024 - Splunk AMER Marketing Partner of the Year 2023 - CRN Tech Innovators Winner 2023 - Great Place to Work® Certified 2020-2025 - Forbes 2023-2024 Best Startup Employers - Equity Investments and Strategic Financing from Springcoast Capital Partners, Splunk Ventures and Vista Credit Partners: $180 million in 2023 - Goldman Sachs portfolio company: $53m Series B investment 2020



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1797&amp;secure%5Bdisplayable_resource_id%5D=1797&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1797&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=108062&amp;secure%5Bresource_id%5D=1797&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fmanaged-detection-and-response-mdr&amp;secure%5Btoken%5D=380a083e4809202df418d6a3a658eb59edcb5dcfa7c519906741ac4ada4f3d45&amp;secure%5Burl%5D=https%3A%2F%2Fwww.deepwatch.com%2Fplatform%2Fg2&amp;secure%5Burl_type%5D=book_demo)

---

  ## Top-Rated Products (Ranked by G2 Score)
### 1. [Acronis Cyber Protect Cloud](https://www.g2.com/products/acronis-cyber-protect-cloud/reviews)
  Acronis delivers the world’s most complete cyber resilience platform, combining backup, disaster recovery, cybersecurity, RMM, and business operations tools into a single, natively integrated solution. Built specifically for Managed Service Providers (MSPs) and IT teams, Acronis simplifies operations with one agent, one console, and one license model. Automation, AI-driven insights, and multi-tenant management ensure that fewer technicians can manage more clients at lower cost. With predictable pricing and transparent billing, Acronis enables partners and IT teams to scale efficiently, comply with regulations, and deliver unmatched resilience. No other vendor delivers this level of integration, efficiency, and MSP alignment. Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek. Acronis is majority-owned by EQT.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 1,263

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 10.0/10 (Category avg: 9.0/10)
- **Automated remediation:** 10.0/10 (Category avg: 8.6/10)
- **Automated investigation:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Acronis](https://www.g2.com/sellers/acronis)
- **Company Website:** https://www.acronis.com/
- **Year Founded:** 2003
- **HQ Location:** Schaffhausen
- **Twitter:** @acronis (94,736 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/13179/ (1,917 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO, Director
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 68% Small-Business, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (217 reviews)
- Backup Solutions (213 reviews)
- Backup Ease (169 reviews)
- Protection (159 reviews)
- Security (158 reviews)

**Cons:**

- Slow Performance (77 reviews)
- Expensive (65 reviews)
- Complexity (53 reviews)
- Poor Customer Support (50 reviews)
- Backup Issues (41 reviews)

### 2. [Huntress Managed EDR](https://www.g2.com/products/huntress-managed-edr/reviews)
  At Huntress, we believe that enterprise-grade endpoint security shouldn’t just be for big security teams with the most resources. When basic defenses don&#39;t cut it, Huntress Managed EDR levels the cybersecurity playing field with a solution for ALL businesses. Our comprehensive platform combines fully-owned technology with expert oversight, including 24/7 monitoring by a team of expert hunters specializing in wrecking hackers day in and day out. Our focus is on hitting hackers when and where it matters most, so we filter out the noise of false positives and only alert you on real threats. And if hackers breach your defenses, we isolate and eliminate those threats for you with speed and precision. With Huntress, you’re not just keeping pace—you’re leveling up to world-class endpoint security. Huntress gives organizations of all sizes a top EDR solution with the ease of use security teams actually need so they can sleep at night knowing they&#39;re protected.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 877

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.6/10 (Category avg: 9.0/10)
- **Automated remediation:** 9.3/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Huntress Labs](https://www.g2.com/sellers/huntress-labs)
- **Company Website:** https://huntress.com
- **Year Founded:** 2015
- **HQ Location:** Ellicott City, US
- **Twitter:** @HuntressLabs (40,164 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10172550/ (916 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, President
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 79% Small-Business, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (158 reviews)
- Ease of Use (125 reviews)
- Threat Detection (92 reviews)
- Protection (75 reviews)
- Continuous Monitoring (70 reviews)

**Cons:**

- Improvements Needed (20 reviews)
- Lack of Customization (17 reviews)
- Poor Reporting (17 reviews)
- Alert Issues (15 reviews)
- Integration Issues (15 reviews)

### 3. [Sophos MDR](https://www.g2.com/products/sophos-mdr/reviews)
  Sophos Managed Detection and Response (MDR) is a fully managed service delivered by experts who detect and respond to cyberattacks targeting your computers, servers, networks, cloud workloads, email accounts, backups, and more. Our highly skilled security analysts stop advanced human-led attacks and take immediate action to neutralize threats before they can disrupt your business operations or compromise your sensitive data.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 500

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.4/10 (Category avg: 9.0/10)
- **Automated remediation:** 9.1/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Sophos](https://www.g2.com/sellers/sophos)
- **Company Website:** https://www.sophos.com/
- **Year Founded:** 1985
- **HQ Location:** Oxfordshire
- **Twitter:** @Sophos (36,753 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5053/ (5,561 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, IT Director
  - **Top Industries:** Information Technology and Services, Manufacturing
  - **Company Size:** 63% Mid-Market, 21% Enterprise


#### Pros & Cons

**Pros:**

- Threat Detection (22 reviews)
- Continuous Monitoring (21 reviews)
- Ease of Use (21 reviews)
- Peace of Mind (13 reviews)
- Response Time (13 reviews)

**Cons:**

- Expensive (8 reviews)
- Communication Issues (7 reviews)
- Limited Customization (7 reviews)
- Integration Issues (6 reviews)
- Poor Reporting (6 reviews)

### 4. [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews)
  Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Experience best-in-class protection thanks to our in-house global cyber threat intelligence, compiled and examined for over 30 years, which drives our extensive R&amp;D network led by industry-acclaimed researchers. ESET PROTECT, our cloud-first XDR cybersecurity platform combines next-gen prevention, detection, and proactive threat hunting capabilities. ESET&#39;s highly customizable solutions include local support and have minimal impact on performance, identify and neutralize known and emerging threats before they can be executed, support business continuity, and reduce the cost of implementation and management. HOW YOUR ORGANIZATION WILL BENEFIT - Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. - Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. - Easily accessible ESET PROTECT console improves TCO of security management. - Single-pane-of-glass remote management for visibility of threats, users, and quarantined items. - Company endpoints and mobiles are protected via advanced multilayered technology, now with brute-force attack protection.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 937

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.7/10 (Category avg: 9.0/10)
- **Automated remediation:** 9.8/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [ESET](https://www.g2.com/sellers/eset)
- **Company Website:** https://www.eset.com
- **Year Founded:** 1992
- **HQ Location:** Bratislava, Slovak Republic
- **Twitter:** @ESET (276,293 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/28967/ (1,983 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Network Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 46% Mid-Market, 46% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (91 reviews)
- Protection (76 reviews)
- Reliability (67 reviews)
- Security (61 reviews)
- Centralized Management (57 reviews)

**Cons:**

- Learning Curve (31 reviews)
- Difficult Configuration (30 reviews)
- Not User-Friendly (24 reviews)
- Lack of Clarity (22 reviews)
- Difficult Navigation (20 reviews)

### 5. [Huntress Managed ITDR](https://www.g2.com/products/huntress-managed-itdr/reviews)
  Hackers aren’t wasting time breaking into your networks the hard way—they’re using infostealers to grab credentials, session cookies, and access tokens in seconds. Huntress Managed ITDR is designed for this always-evolving threat landscape. With a 3-minute mean time to respond (MTTR) and a low false positive rate, Huntress stops real threats before they wreck your business. Built to support organizations of ALL sizes, Huntress Managed ITDR closes blind spots across your workflows and shuts down avenues attackers rely on. Our enterprise-grade solution gives you continuous monitoring for identity-based threats, rapid detection of unauthorized access, location-based and VPN/tunnel/proxy anomalies, and fast response to suspicious activities like rogue applications, shadow workflows, and business email compromise (BEC) scams. By focusing on protecting user credentials and session tokens, Huntress keeps your organization&#39;s digital identities safe, even as attackers develop sneakier tactics.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 93

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.5/10 (Category avg: 9.0/10)
- **Automated remediation:** 9.6/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Huntress Labs](https://www.g2.com/sellers/huntress-labs)
- **Company Website:** https://huntress.com
- **Year Founded:** 2015
- **HQ Location:** Ellicott City, US
- **Twitter:** @HuntressLabs (40,164 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10172550/ (916 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 76% Small-Business, 18% Mid-Market


#### Pros & Cons

**Pros:**

- Continuous Monitoring (23 reviews)
- Threat Detection (22 reviews)
- Alert Management (12 reviews)
- Easy Integrations (12 reviews)
- Customer Support (11 reviews)

**Cons:**

- Inadequate Detection (5 reviews)
- Inefficient Alert System (5 reviews)
- Limited Control (4 reviews)
- Portal Issues (4 reviews)
- UX Improvement (4 reviews)

### 6. [Blackpoint Cyber](https://www.g2.com/products/blackpoint-cyber/reviews)
  Blackpoint Cyber is the forerunner in the managed detection and response space, leveraging our proprietary ecosystem to help our partners fight back and win against cyberthreats. We have served the community since 2014 and proudly continue to safeguard businesses around the world. We believe that no one should go alone into the unfair fight. At Blackpoint, our team strives to provide unified, 24/7 detection to help you take out your adversaries before they can even see us coming.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 257

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.4/10 (Category avg: 9.0/10)
- **Automated remediation:** 9.0/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Blackpoint Cyber](https://www.g2.com/sellers/blackpoint-cyber)
- **Year Founded:** 2014
- **HQ Location:** Denver, Colorado, United States
- **Twitter:** @blackpointus (1,528 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/9381059/ (196 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** President, Owner
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 82% Small-Business, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (19 reviews)
- Threat Detection (17 reviews)
- Deployment Ease (14 reviews)
- Setup Ease (13 reviews)
- SOC Services (13 reviews)

**Cons:**

- Expensive (5 reviews)
- Integration Issues (5 reviews)
- Poor Reporting (5 reviews)
- Portal Issues (5 reviews)
- Difficult Navigation (3 reviews)

### 7. [ThreatDown](https://www.g2.com/products/threatdown/reviews)
  ThreatDown is an all-in-one cybersecurity platform that delivers enterprise-grade protection without the complexity. Built to make advanced cybersecurity accessible without adding headcount. ThreatDown MDR monitors your environment around the clock, investigates alerts on your behalf, and takes action to contain threats before they spread— delivering the protection of an in-house SOC without the cost. One lightweight agent. One cloud-based console. ThreatDown brings endpoint and identity security together with patch management, vulnerability assessment, DNS filtering, and email security—eliminating tool sprawl and reducing operational overhead. Native EDR and ITDR telemetry connects user activity with endpoint behavior, giving teams the full attack story so they can detect and respond faster. Backed by nearly two decades of Malwarebytes expertise, ThreatDown pairs award-winning detection with a patented remediation engine that removes every trace of malware to prevent reinfection. It stops ransomware, credential theft, zero-day exploits, phishing, and human-operated attacks—and goes further with built-in ransomware rollback to help organizations recover quickly. Deploy in minutes. See value fast. Recognized as an MRG Effitas Product of the Year and a G2 Leader, ThreatDown is consistently rated for ease of use, rapid deployment, and high-quality support. ThreatDown Solutions ThreatDown MDR (Managed Detection and Response) delivers 24/7/365 human-led threat monitoring, investigation, and remediation powered by Malwarebytes detection and AI-driven engines—closing the security resource gap and reducing risk from unknown threats. ThreatDown EDR (Endpoint Detection and Response) protects against ransomware, zero-day exploits, phishing, and human-operated attacks that bypass prevention layers, with the tools to detect, investigate, and contain threats. ThreatDown ITDR (Identity Threat Detection and Response) stops identity-based attacks by continuously monitoring credential, privilege, and access behavior across Active Directory, Microsoft Entra ID, and Okta. Native correlation with EDR delivers unified endpoint-to-identity visibility and response—closing the post-authentication gap that IAM and MFA leave open. For Partners Our multi-tenant ThreatDown OneView platform enables MSPs and IT admins to streamline operations with centralized management of customer endpoints, license subscriptions, reporting, and global policies. With products and services like Endpoint Detection and Response (EDR), Managed Detection and Response (MDR) and the rest of our technologies in our portfolio, partners can offer the right product or service to each customer, tailored to their specific needs. Find out more about our partner program at https://www.threatdown.com/partner-program.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,040

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.2/10 (Category avg: 9.0/10)
- **Automated remediation:** 9.1/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Malwarebytes](https://www.g2.com/sellers/malwarebytes)
- **Company Website:** https://www.malwarebytes.com
- **Year Founded:** 2008
- **HQ Location:** Santa Clara, CA
- **Twitter:** @Malwarebytes (88,489 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/malwarebytes/ (613 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 48% Small-Business, 41% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (99 reviews)
- Features (68 reviews)
- Security (59 reviews)
- Threat Detection (56 reviews)
- Customer Support (54 reviews)

**Cons:**

- Poor Customer Support (23 reviews)
- Lack of Clarity (22 reviews)
- Missing Features (20 reviews)
- False Positives (18 reviews)
- Communication Issues (16 reviews)

### 8. [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
  ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This suite of security tools is tailored for a wide range of users, including businesses, government agencies, and academic institutions, all of whom face the increasing threat of cybercrime. By enabling users to manage application execution, ThreatLocker aims to create a secure environment where organizations can operate without the looming fear of malware and other cyber threats. The ThreatLocker suite stands out in the cybersecurity landscape due to its focus on application whitelisting, a proactive approach that allows organizations to define and enforce policies on what software can be executed. This feature is particularly beneficial for organizations that require stringent security measures, as it minimizes the risk of unauthorized applications compromising sensitive data. The solution is designed for IT administrators who seek to enhance their network security posture while maintaining operational efficiency. One of the key features of ThreatLocker is its ability to provide real-time visibility and control over application behavior. This allows organizations to monitor application usage and detect any suspicious activities that may indicate a potential threat. Additionally, ThreatLocker offers customizable policies that can be tailored to meet the specific needs of different departments or user groups within an organization, ensuring that security measures align with operational requirements. Another significant benefit of ThreatLocker is its user-friendly interface, which simplifies the management of security policies. This accessibility enables IT teams to implement and adjust security measures without extensive training or expertise in cybersecurity. Furthermore, ThreatLocker is backed by a team of experienced cybersecurity professionals who continuously update and enhance the platform to address emerging threats and vulnerabilities. In essence, ThreatLocker provides organizations with the tools they need to take control of their cybersecurity strategy. By focusing on application control and offering robust monitoring capabilities, ThreatLocker helps organizations mitigate risks associated with cyber threats while fostering a secure environment for their operations. This innovative approach to cybersecurity empowers users to navigate their digital landscape confidently, free from the influence of cybercriminals.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 473

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 8.8/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.3/10 (Category avg: 8.6/10)
- **Automated investigation:** 8.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Threatlocker Inc](https://www.g2.com/sellers/threatlocker-inc)
- **Company Website:** https://www.threatlocker.com
- **Year Founded:** 2017
- **HQ Location:** Orlando, Florida, United States
- **Twitter:** @ThreatLocker (2,738 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/65512111/ (700 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** President, CEO
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 54% Small-Business, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (92 reviews)
- Threat Detection (87 reviews)
- Ease of Use (75 reviews)
- Security (71 reviews)
- Protection (69 reviews)

**Cons:**

- Learning Curve (44 reviews)
- Difficult Learning Curve (30 reviews)
- Difficult Configuration (16 reviews)
- Difficult Navigation (14 reviews)
- Training Required (13 reviews)

### 9. [Guardz](https://www.g2.com/products/guardz/reviews)
  Guardz is a unified cybersecurity platform specifically designed for Managed Service Providers (MSPs). This innovative solution consolidates essential security controls, identity threat detection and response (ITDR), endpoint protection (EDR), email security, user awareness training and phishing simulations, and Managed Detection and Response (MDR) into a single AI-native framework. The platform aims to enhance operational efficiency by streamlining security processes and providing a comprehensive approach to cybersecurity. Targeting MSPs, Guardz addresses the unique challenges these providers face in managing multiple security tools that often operate in silos. By adopting an identity-centric approach, Guardz connects various security vectors, effectively reducing the gaps that can leave organizations vulnerable. This layered and holistic view enables MSPs to respond to user risks in real time, ensuring that security measures are not only reactive but also proactive in safeguarding client environments. Key features of Guardz include its 24/7 AI and human-led Managed Detection and Response (MDR) services. The platform employs agentic AI to triage threats at machine speed, allowing for rapid identification and prioritization of potential security incidents. This automated triage process is complemented by expert analysts who validate findings, mitigate risks, and guide response actions. As a result, MSPs can offer scalable protection to their clients without the need to expand their workforce, making it a cost-effective solution for growing cybersecurity demands. Guardz stands out in the cybersecurity landscape by providing a unified platform that integrates various security functions into one cohesive system. This integration not only simplifies the management of security tools but also enhances the overall effectiveness of security measures. By leveraging AI-driven insights and human expertise, Guardz empowers MSPs to deliver robust cybersecurity solutions that adapt to the evolving threat landscape, ensuring their clients remain protected against emerging risks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 107

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 8.9/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.8/10 (Category avg: 8.6/10)
- **Automated investigation:** 8.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Guardz](https://www.g2.com/sellers/guardz)
- **Company Website:** https://guardz.com/
- **Year Founded:** 2022
- **HQ Location:** Tel Aviv, IL
- **Twitter:** @GuardzCyber (110 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/guardz/ (153 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 73% Small-Business, 21% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (58 reviews)
- Security (49 reviews)
- Features (37 reviews)
- Easy Setup (28 reviews)
- Threat Detection (28 reviews)

**Cons:**

- Limited Features (13 reviews)
- Integration Issues (8 reviews)
- Lack of Features (8 reviews)
- Limited Customization (8 reviews)
- Insufficient Information (7 reviews)

### 10. [Arctic Wolf](https://www.g2.com/products/arctic-wolf/reviews)
  Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service. Arctic Wolf solutions include Arctic Wolf® Managed Detection and Response (MDR), Managed Risk, and Managed Security Awareness —each delivered by the industry’s original Concierge Security® Team. Highly-trained Concierge Security experts work as an extension of internal teams to provide 24x7 monitoring, detection, and response, as well as ongoing risk management to give organizations the protection, resilience and guidance they need to defend against cyber threats. Visit arcticwolf.com to get the latest industry resources and learn more about our solutions.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 275

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.2/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.3/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Arctic Wolf Networks](https://www.g2.com/sellers/arctic-wolf-networks)
- **Company Website:** https://www.arcticwolf.com
- **Year Founded:** 2012
- **HQ Location:** Eden Prairie, MN
- **Twitter:** @AWNetworks (4,497 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2760138/ (3,382 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, IT Director
  - **Top Industries:** Hospital &amp; Health Care, Information Technology and Services
  - **Company Size:** 71% Mid-Market, 20% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (58 reviews)
- Threat Detection (47 reviews)
- Cybersecurity (28 reviews)
- Ease of Use (27 reviews)
- Alerts (22 reviews)

**Cons:**

- Expensive (10 reviews)
- False Positives (7 reviews)
- Learning Curve (7 reviews)
- Cybersecurity Risks (6 reviews)
- Dashboard Issues (5 reviews)

### 11. [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews)
  Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, single-agent platform purpose-built for MSPs, MSSPs, and Mid-Market IT professionals. Each module is designed to be deployed in a targeted, agile approach to meet any use case. When all modules are combined, our platform becomes a comprehensive security solution that is cloud-first, globally accessible, and features a highly intuitive interface. With Todyl, your security stack becomes one comprehensive, consolidated, and customizable platform, making security more intuitive and streamlined to combat modern threats. Our platform helps to eliminate the complexity, cost, and operational overhead traditional approaches to cybersecurity require, empowering teams with the capabilities they need to protect, detect, and respond to cyberattacks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 96

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.1/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.5/10 (Category avg: 8.6/10)
- **Automated investigation:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Todyl](https://www.g2.com/sellers/todyl)
- **Company Website:** https://www.todyl.com/
- **Year Founded:** 2015
- **HQ Location:** Denver, CO
- **LinkedIn® Page:** https://www.linkedin.com/company/todylprotection (125 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** President, Owner
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 73% Small-Business, 8% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (64 reviews)
- Customer Support (51 reviews)
- Features (41 reviews)
- Security (39 reviews)
- Deployment Ease (35 reviews)

**Cons:**

- Improvements Needed (21 reviews)
- Integration Issues (14 reviews)
- Inadequate Reporting (12 reviews)
- Limited Features (12 reviews)
- Poor Reporting (12 reviews)

### 12. [Field Effect MDR](https://www.g2.com/products/field-effect-mdr/reviews)
  Field Effect delivers intelligence-grade managed detection and response for the AI era. Built on Federated Smart Compute™ and nation-state tradecraft, our holistic MDR platform uncovers weaknesses early, blocks attacks in real time, and reduces risk across the entire threat surface—endpoint, network, cloud, and more. With an 18-second median time to detect, Field Effect helps MSPs and overwhelmed IT teams outpace agentic attacks and achieve premium protection with the team they have.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 41

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.2/10 (Category avg: 9.0/10)
- **Automated remediation:** 7.6/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Field Effect](https://www.g2.com/sellers/field-effect)
- **Company Website:** https://fieldeffect.com/
- **Year Founded:** 2016
- **HQ Location:** Ottawa
- **Twitter:** @fieldeffectsoft (1,306 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/field-effect-software (148 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Small-Business, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (10 reviews)
- Ease of Use (10 reviews)
- Protection (7 reviews)
- Threat Detection (7 reviews)
- Alert Notifications (6 reviews)

**Cons:**

- Alert Issues (7 reviews)
- Inefficient Alert System (5 reviews)
- Communication Issues (4 reviews)
- Insufficient Information (3 reviews)
- Learning Curve (3 reviews)

### 13. [eSentire](https://www.g2.com/products/esentire/reviews)
  eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Continuous Threat Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience &amp; prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire&#39;s award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @eSentire.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 283

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.1/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.5/10 (Category avg: 8.6/10)
- **Automated investigation:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [eSentire](https://www.g2.com/sellers/esentire)
- **Company Website:** https://www.esentire.com
- **Year Founded:** 2001
- **HQ Location:** Waterloo, Ontario
- **Twitter:** @eSentire (6,445 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/150760/ (569 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, CTO
  - **Top Industries:** Financial Services, Legal Services
  - **Company Size:** 58% Mid-Market, 23% Enterprise


#### Pros & Cons

**Pros:**

- Response Time (32 reviews)
- Customer Support (26 reviews)
- SOC Services (21 reviews)
- Staff Expertise (21 reviews)
- Continuous Monitoring (18 reviews)

**Cons:**

- Communication Issues (17 reviews)
- Inefficient Alert System (9 reviews)
- Expensive (8 reviews)
- Portal Issues (8 reviews)
- Poor Reporting (6 reviews)

### 14. [LevelBlue MTDR](https://www.g2.com/products/levelblue-mtdr/reviews)
  LevelBlue’s Managed Extended Detection and Response (MXDR) service delivers continuous, expert-driven protection across networks, endpoints, identities, cloud apps, and email. Backed by a 24/7 SOC, LevelBlue helps organizations rapidly realize value from existing technology investments while reducing cyber risk in complex hybrid environments. Our seasoned security engineers provide co-management for your XDR and SIEM, ensuring both are expertly managed and optimized to stay ahead of evolving threats. LevelBlue empowers your team with proprietary threat intelligence, flexible integration with existing technologies, and measurable outcomes—strengthening enterprise security and partnering with you to minimize cyber risk. Recent LevelBlue Acquisitions: - Alert Logic is a LevelBlue Co. - Trustwave is a LevelBlue Co. - Cybereason is a LevelBlue Co.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 247

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 8.7/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.3/10 (Category avg: 8.6/10)
- **Automated investigation:** 8.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [LevelBlue](https://www.g2.com/sellers/levelblue-49a2e3c1-ca90-4308-b899-08973f657bae)
- **HQ Location:** Dallas, Texas, United States
- **LinkedIn® Page:** https://www.linkedin.com/company/levelbluecyber/ (638 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 52% Mid-Market, 36% Enterprise


### 15. [Cynet](https://www.g2.com/products/cynet/reviews)
  Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs). This platform consolidates a wide array of security capabilities into a single, user-friendly interface, ensuring that organizations can effectively safeguard their digital assets without the complexity often associated with multi-solution environments. Cynet’s platform simplifies security management by integrating various functionalities, such as endpoint protection, threat detection, and incident response, into one cohesive system. This integration not only streamlines operations but also allows organizations to allocate their resources more effectively, ultimately enhancing their overall security posture. One of the standout features of Cynet’s platform is its remarkable performance in the MITRE ATT&amp;CK Evaluations. Cynet delivered 100% visibility and 100% analytic coverage without requiring any configuration changes three years in a row. This capability ensures that organizations can monitor their environments comprehensively and respond to threats with precision. The platform’s built-in analytics and reporting tools provide actionable insights, enabling users to make informed decisions about their cybersecurity strategies. Additionally, Cynet offers 24/7 expert support, which is crucial for organizations that may not have in-house cybersecurity expertise. This round-the-clock assistance ensures that users can quickly address any security incidents or concerns, minimizing potential downtime and damage. The combination of advanced technology and dedicated support positions Cynet as a valuable partner for SMEs and service providers looking to enhance their cybersecurity measures. In summary, Cynet’s unified, AI-powered cybersecurity platform stands out in the crowded cybersecurity market by offering a unified solution tailored to the needs of MSPs. Its comprehensive features, exceptional performance in industry evaluations, and continuous expert support make it a compelling choice for organizations seeking to bolster their cybersecurity defenses while maintaining operational efficiency.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 208

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.3/10 (Category avg: 9.0/10)
- **Automated remediation:** 9.4/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Cynet](https://www.g2.com/sellers/cynet)
- **Company Website:** https://www.cynet.com/
- **Year Founded:** 2014
- **HQ Location:** Boston, MA
- **LinkedIn® Page:** https://www.linkedin.com/company/cynet-security/ (329 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** SOC Analyst, Technical Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 58% Mid-Market, 30% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (48 reviews)
- Features (36 reviews)
- Threat Detection (34 reviews)
- Customer Support (32 reviews)
- Security (31 reviews)

**Cons:**

- Limited Customization (11 reviews)
- Feature Limitations (10 reviews)
- Lack of Customization (10 reviews)
- Limited Features (10 reviews)
- Missing Features (10 reviews)

### 16. [RocketCyber](https://www.g2.com/products/rocketcyber/reviews)
  RocketCyber’s Managed SOC (security operation center) is a managed detection and response service that leverages RocketCyber’s Threat Monitoring Platform to detect malicious and suspicious activity across three critical attack vectors: Endpoint | Network | Cloud. This service is comprised of an elite team of security veterans and experts who proactively hunt and investigate threat activity, perform the triage of detections, and work with your team on the remediation when an actionable threat is discovered.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 42

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 8.6/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.2/10 (Category avg: 8.6/10)
- **Automated investigation:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Kaseya](https://www.g2.com/sellers/kaseya)
- **Company Website:** https://www.kaseya.com/
- **Year Founded:** 2000
- **HQ Location:** Miami, FL
- **Twitter:** @KaseyaCorp (17,428 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaseya/ (5,512 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 74% Small-Business, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Continuous Monitoring (2 reviews)
- Easy Integrations (2 reviews)
- 24/7 Availability (1 reviews)
- Alert Management (1 reviews)
- Customer Support (1 reviews)

**Cons:**

- Inadequate Detection (2 reviews)
- False Positives (1 reviews)
- Limited Integration (1 reviews)

### 17. [Adlumin](https://www.g2.com/products/adlumin/reviews)
  Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlumin platform seamlessly integrates with existing tech stacks, and its flexible management options enable it to be self-managed by an internal team, or fully managed by Adlumin experts. The Adlumin platform stops cyber threats early with deep learning models tailored to each environment. It maximizes resource efficiency by optimizing existing technology and streamlining workflows across teams. Adlumin transforms risk into resilience by identifying and addressing vulnerabilities, while cybersecurity experts proactively uncover and neutralize threats before they can do damage. Adlumin empowers organizations to take control of their digital security making advanced protection accessible to all.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 58

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 8.8/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.7/10 (Category avg: 8.6/10)
- **Automated investigation:** 8.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [N-able](https://www.g2.com/sellers/n-able)
- **Company Website:** https://www.n-able.com
- **HQ Location:** Morrisville, North Carolina
- **Twitter:** @Nable (15,883 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/n-able (2,224 employees on LinkedIn®)
- **Ownership:** NYSE: NABL

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 59% Mid-Market, 22% Small-Business


#### Pros & Cons

**Pros:**

- Analytics (1 reviews)
- Detailed Analysis (1 reviews)
- Detailed Explanation (1 reviews)
- Ease of Management (1 reviews)
- Ease of Use (1 reviews)

**Cons:**

- Poor Customer Support (1 reviews)

### 18. [Expel](https://www.g2.com/products/expel/reviews)
  Expel is the leading managed detection and response (MDR) provider trusted by some of the world’s most recognizable brands to expel their adversaries, minimize risk, and build security resilience. Expel’s 24x7x365 coverage spans the widest breadth of attack surfaces, including cloud, with 100% transparency. We combine world-class security practitioners and our AI-driven platform, Expel Workbench™, to ingest billions of events monthly and still achieve a 21-minute critical alert MTTR. Expel augments existing programs to help customers maximize their security investments and focus on building trust—with their customers, partners, and employees. Expel Managed Detection and Response delivers 24/7 decision support. We integrate with the tech you already have—across attack surfaces—to maximize your existing tech investments. Our platform automates analysis for your vendor alerts to filter out false positives. We’ll enrich the alerts that matter with context so we can resolve them with an average alert-to-fix of 21 minutes for critical alerts. Expel Threat Hunting provides peace of mind that your environment is secure and your defenses are optimized. Expel identifies attacks your automated detections missed, while providing insights that enable a stronger defensive strategy. You get clear guidance on how you can improve your defenses from a dedicated team of experts, without the strain on internal teams. Expel Vulnerability Prioritization accelerates your remediation process by letting you know exactly which vulnerabilities pose the greatest risk, with recommendations on next steps for immediate action. Expel Phishing takes complete ownership of your phishing inbox and provides remediation and guidance when threats enter via this critical attack vector. Unique data from your security technology helps Expel monitor and remove phishing emails from your inbox as well as protecting your entire environment from these attacks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 74

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 8.2/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.1/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Expel](https://www.g2.com/sellers/expel)
- **Company Website:** https://www.expel.com
- **Year Founded:** 2016
- **HQ Location:** Herndon, Virginia
- **Twitter:** @ExpelSecurity (12,820 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/expel/ (487 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Financial Services
  - **Company Size:** 51% Enterprise, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Security (6 reviews)
- Customer Support (5 reviews)
- Easy Integrations (5 reviews)
- Reliability (5 reviews)

**Cons:**

- Communication Issues (4 reviews)
- Limited Customization (4 reviews)
- Inefficient Alert System (3 reviews)
- Limited Integration (3 reviews)
- Expensive (2 reviews)

### 19. [Barracuda Managed XDR](https://www.g2.com/products/barracuda-managed-xdr/reviews)
  Barracuda Managed XDR is the comprehensive next-generation cybersecurity solution that protects organizations of all sizes against today’s ever-evolving threat landscape. Barracuda Managed XDR is a fully managed service instantly augmenting an organization’s IT staff, identifying signals amidst noise, and reducing TTR from days to seconds. The solution features advanced AI-driven threat protection, SIEM, SOAR, and enterprise-grade threat intelligence from 11+ billion IOCs and hundreds of ML-enriched detection rules aligned to the MITRE ATT&amp;CK framework. Ingesting trillions of events across endpoints, servers, identity, cloud, email, and firewalls, the cloud-native solution detects, responds to, and eliminates cyberthreats in real time across the attack lifecycle. An ‘open’ XDR solution, Barracuda Managed XDR integrates with an organization’s existing technology, ensuring a smooth deployment while enhancing security resilience and operational efficiency. Barracuda Managed XDR is powered by Barracuda’s 24/7/365 global SOC, featuring five specialized expert-level teams delivering best-in-class SLAs and proactive real-time threat detection and response.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 34

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 9.6/10 (Category avg: 9.0/10)
- **Automated remediation:** 8.3/10 (Category avg: 8.6/10)
- **Automated investigation:** 9.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Barracuda](https://www.g2.com/sellers/barracuda)
- **Company Website:** https://www.barracuda.com
- **Year Founded:** 2002
- **HQ Location:** Campbell, CA
- **Twitter:** @Barracuda (15,232 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/barracuda-networks/ (2,229 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 44% Small-Business, 35% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (6 reviews)
- Monitoring (6 reviews)
- Protection (6 reviews)
- Security (6 reviews)
- Alerts (5 reviews)

**Cons:**

- Lack of Customization (2 reviews)
- Learning Curve (2 reviews)
- Not User-Friendly (2 reviews)
- Portal Issues (2 reviews)
- Agent Issues (1 reviews)

### 20. [CYREBRO](https://www.g2.com/products/cyrebro/reviews)
  CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interactive SOC Platform. CYREBRO rapidly detects, analyzes, investigates and responds to cyber threats, for businesses of all sizes.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 128

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.3/10)
- **Proactive threat hunting:** 8.5/10 (Category avg: 9.0/10)
- **Automated remediation:** 6.7/10 (Category avg: 8.6/10)
- **Automated investigation:** 7.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [CYREBRO](https://www.g2.com/sellers/cyrebro)
- **Year Founded:** 2013
- **HQ Location:** Tel Aviv, IL
- **Twitter:** @CYREBRO_IO (309 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cyrebro/ (99 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 64% Mid-Market, 25% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (12 reviews)
- Customer Support (10 reviews)
- Alerting System (7 reviews)
- Alerts (7 reviews)
- Dashboard Usability (7 reviews)

**Cons:**

- Update Issues (5 reviews)
- Communication Issues (4 reviews)
- Poor Customer Support (4 reviews)
- Dashboard Issues (3 reviews)
- Ineffective Alerts (3 reviews)


  
## Parent Category

[System Security Software](https://www.g2.com/categories/system-security)



## Related Categories

- [Incident Response Software](https://www.g2.com/categories/incident-response)
- [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr)
- [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms)
- [Network Detection and Response (NDR) Software](https://www.g2.com/categories/network-detection-and-response-ndr)
- [Extended Detection and Response (XDR) Platforms](https://www.g2.com/categories/extended-detection-and-response-xdr-platforms)
- [Identity Threat Detection and Response (ITDR)  Software](https://www.g2.com/categories/identity-threat-detection-and-response-itdr)
- [Cloud Detection and Response (CDR) Software](https://www.g2.com/categories/cloud-detection-and-response-cdr)


  
---

## Buyer Guide

### What You Should Know About Managed Detection and Response (MDR) Software

### What is the best MDR software for financial services firms?

Based on expert G2 reviews, these are some of the top Managed Detection and Response (MDR) software for financial services firms:

- [Sophos](https://www.g2.com/products/sophos-mdr/reviews)
- [Arctic Wolf](https://www.g2.com/products/arctic-wolf/reviews)
- [Alert Logic](https://www.g2.com/products/alert-logic-mdr/reviews)
- [CrowdStrike](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
- [SentinelOne](https://www.g2.com/products/sentinelone-vigilance-respond/reviews)

These services offer 24/7 monitoring, threat hunting, cloud security, endpoint detection and response (EDR), and incident response solutions to protect financial service firms and institutions, to fit the company&#39;s needs and protect it against cyberattacks.

### Which MDR solutions are best for startups?

For startup companies looking for the best MDR solutions, there are several good options recommended by G2 users:

- [Red Canary](https://www.g2.com/products/red-canary/reviews): Focuses on offering constant support with a user-friendly interface.
- [Defendify](https://www.g2.com/products/defendify-all-in-one-cybersecurity-solution/reviews): An all-in-one platform that focuses on simplified cybersecurity solutions for small businesses with limited security resources.
- [Cynet](https://www.g2.com/products/cynet-all-in-one-cybersecurity-platform/reviews): An all-in-one cybersecurity platform designed to be scalable and adaptable for growing businesses.
- [Huntress](https://www.g2.com/products/huntress-managed-edr/reviews): Specializes in protecting small to mid-sized businesses by offering ongoing support, 24/7 monitoring, and threat hunting capabilities.
- [Blumira](https://www.g2.com/products/blumira-automated-detection-response/reviews): Praised for its focus on SMBs, and offers automated detection and response services.



    
