Huntress - Hunting your Ransomware
Overall Satisfaction with Huntress
In building our security practice and stack, we were looking for a security product that fits the needs of all of our users and our customers. The product needed to be safe and secure, obviously, but more to that would reduce our cost of support while improving the security in our customer base. Huntress MDR ticks almost all of our boxes and has set my mind at ease, allowing me to take that much wanted rest, especially over the holidays, when our customers are more vulnerable. Huntress helps to highlight any potential footholds, security issues, and ongoing threat detection on all our servers and workstations.
Pros
- Security foothold identification
- Detects abuse against real windows applications and services
- Great security reports
Cons
- [I] would like to see more SOC as a Service - service from them.
- [I would also like] improved Intune integration, especially with Windows Defender and the rest of the suite.
- Breach monitoring
- Foothold threat hunting
- Clear, useful reporting
- Support
- [It] lowered [the] total cost of T2 security support by 15%.
- Better security reporting saves a lot of time prepping for QBRs.
- There is no auto-remediation, but [it] is designed like that to not interrupt the user's day.
Firstly from a business model, [VMware] Carbon Black [Cloud Managed Detection] was not outfitted for the MSP where Huntress is very MSP-friendly from an affordably easy point to entry to value for money licensing. Carbon Black TS is not bad in anyway, well, that we found, but Huntress is a new layer of security that fits between the OS and AV layers to provide additional information, monitoring, and detection. With Huntress backing the MSP, [it] sure does help as well.
Do you think Huntress delivers good value for the price?
Yes
Are you happy with Huntress's feature set?
Yes
Did Huntress live up to sales and marketing promises?
Yes
Did implementation of Huntress go as expected?
Yes
Would you buy Huntress again?
Yes
Comments
Please log in to join the conversation