We compared Huntress and Webroot Business Endpoint Protection based on our users reviews.
Our conclusion is that Huntress and Webroot Business Endpoint Protection have simple and convenient setup processes. Huntress is known for its expertise in threat-hunting and its 24/7 SOC, while Webroot is praised for its user-friendly interface. Huntress could improve its reporting and integration with other solutions, while Webroot could enhance its reporting system and integrate better with reliable OTXs. Huntress has generally favorable pricing, while Webroot is considered affordable and cost-effective. Customer support for both products has received mixed feedback, with some users finding it responsive and others experiencing issues.
We primarily focused on the topics below:
The summary above is based on 15 interviews we conducted with Huntress and Webroot Business Endpoint Protection users. To access the interviews' full transcripts, download our report.
"The price is low and quite competitive with others."
"The setup is pretty simple."
"The solution was relatively easy to deploy."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"Ability to get forensics details and also memory exfiltration."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"I have found it valuable that this solution is always there and always armed."
"It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry."
"Huntress' best feature is the threat-hunting expertise that is part of their 24/7 SOC."
"While threat hunting is undoubtedly the most valuable feature, the combination of IP scanning, foothold identification, and canary monitoring has also proven to be incredibly beneficial."
"Huntress helps by highlighting potential issues, allowing us to take proactive measures."
"We don’t have the required staff to watch the issues that are happening. It is good to have a team from Huntress who can watch the logs 24/7. The tool’s automatic remediation is also fantastic. The solution’s interface is also nice and easy to use. The Huntress team saves us time by going through the issues."
"It is incredibly efficient for our engineering team because Huntress provides all the information needed to fix issues, not just flag them."
"The EDR product is simple to install. It is low maintenance. All the alerts go to Huntress first, and their analyst team reviews them and sends actionable things our way."
"The initial setup is not complex at all. It's very straightforward."
"It is very lightweight on the workstations, not slowing them down while still doing its job very well."
"Probably, compared to other antivirus programs, what we like about it is it is lightweight."
"Speed"
"It is an easy-to-use and easy-to-configure product."
"I haven't observed any of the instabilities in the solution. It is a stable solution."
"The solution has many features. It is very easy to define and set the policies based on the user groups, it does not take up a lot of resources in operation, and has provided us with a good track record of protection."
"Valuable features include good scanning, very light footprint and management console that the client can access and (just as important) in which I can see status of groups of computers (I am a consultant, IT role)."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"Detections could be improved."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"The dashboard isn't easy to access and manage."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"The solution's UI is an area with certain shortcomings that need improvement."
"One area for improvement in Huntress would be to allow for PSA integration from a specific IP address or hostname for better security measures."
"I would like the API to be a little better. They are getting there."
"In the next release, I'd like to see more intuitive dashboards."
"The Huntress is not a standalone solution. It really needs to be used with something else such as Microsoft Defender or another antivirus solution. It would be nice to see the product fleshed out by the Huntress team and include the antivirus solution part as well. I want it to be a full-fledged XDR product. It would push the tool to a higher price range but it would be nice to see the fleshed out features. I want them to integrate more features from the XDR realm."
"We need an API to automatically retrieve metrics and data about backend activity so we can generate client reports."
"I'd like Huntress to implement a component that can analyze network traffic for specific sites."
"Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."
"The only complaint I have with Webroot is its inability to prevent UoD phishing and its inability to check against bots or block anti-attacks. Plus the URL server is in zero-definition."
"I believe that Webroot Business Endpoint Protection should offer a more modern UI."
"The console spins up relatively slowly, and some of the configuration items are obscure (e.g., reporting back one time per day is a default setting) and need to be tweaked."
"There needs to be more advanced analytics. It would make it a more powerful antivirus solution within the marketplace."
"Technical support is not the best. It's hard to get a hold of them if we need help. It's something that definitely needs improvement."
"I want Webroot to be easier to use and set up. It is not very intuitive."
"An updated UI would be nice, but is not hardly used."
"It would be nice if it had a feature for automatically generating reports on the client end for device status, security status and backup information."
More Webroot Business Endpoint Protection Pricing and Cost Advice →
Huntress is ranked 13th in Endpoint Protection Platform (EPP) with 12 reviews while Webroot Business Endpoint Protection is ranked 34th in Endpoint Protection Platform (EPP) with 30 reviews. Huntress is rated 9.4, while Webroot Business Endpoint Protection is rated 8.2. The top reviewer of Huntress writes "Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "Lightweight and not hard to set up however, does not offer good reporting". Huntress is most compared with SentinelOne Vigilance, Blackpoint Cyber MDR, CrowdStrike Falcon Complete, Arctic Wolf Managed Detection and Response and Sophos MDR, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, HP Wolf Security, SentinelOne Singularity Complete and Cynet. See our Huntress vs. Webroot Business Endpoint Protection report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.