We compared Huntress and Webroot Business Endpoint Protection based on our users reviews.
Our conclusion is that Huntress and Webroot Business Endpoint Protection have simple and convenient setup processes. Huntress is known for its expertise in threat-hunting and its 24/7 SOC, while Webroot is praised for its user-friendly interface. Huntress could improve its reporting and integration with other solutions, while Webroot could enhance its reporting system and integrate better with reliable OTXs. Huntress has generally favorable pricing, while Webroot is considered affordable and cost-effective. Customer support for both products has received mixed feedback, with some users finding it responsive and others experiencing issues.
We primarily focused on the topics below:
The summary above is based on 15 interviews we conducted with Huntress and Webroot Business Endpoint Protection users. To access the interviews' full transcripts, download our report.
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"Forensics is a valuable feature of Fortinet FortiEDR."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"This is stable and scalable."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The most valuable aspect of Huntress is its 24/7 SOC service."
"We don’t have the required staff to watch the issues that are happening. It is good to have a team from Huntress who can watch the logs 24/7. The tool’s automatic remediation is also fantastic. The solution’s interface is also nice and easy to use. The Huntress team saves us time by going through the issues."
"It catches things that no one else catches. We occasionally have things slip through antivirus and other things, but Huntress catches them. It is awesome as an additional layer of defense on top of other things."
"Huntress helps by highlighting potential issues, allowing us to take proactive measures."
"It is incredibly efficient for our engineering team because Huntress provides all the information needed to fix issues, not just flag them."
"Scalability-wise, I rate the solution a ten out of ten...I rate the technical support a ten out of ten."
"Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
"I have found it valuable that this solution is always there and always armed."
"It monitors traffic and keeps us from getting ransomware or other viruses."
"Doesn't consume resources or affect the computer performance at all."
"Valuable features include good scanning, very light footprint and management console that the client can access and (just as important) in which I can see status of groups of computers (I am a consultant, IT role)."
"It is very lightweight on the workstations, not slowing them down while still doing its job very well."
"The most valuable features of the solution include the endpoint navigation protection, the protection related to the EMS service, as well as the control and the cloud integration capabilities."
"The initial setup is not complex at all. It's very straightforward."
"It is pretty unintrusive. It doesn't take over the system like McAfee or Norton. It doesn't use a whole lot of resources. McAfee and Norton use a lot of resources."
"I like that Webroot is very lightweight. It didn't bog down the machine, and more importantly, it had heuristics artificial intelligence to some degree. It wasn't like full-blown artificial intelligence, but something where you have one endpoint recognizing issues because it maintains a cloud database. If one client recognizes a threat, it would add it to the database, and almost immediately, every agent in the world would also know about that threat. That was very appealing to us. However, now it's becoming commonplace, whereas ventures like Symantec and McAfee were based more on the traditional model of definition and updates, and we were always falling behind. Webroot also has pretty good technical support."
"ZTNA can improve latency."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"The solution is not stable."
"The solution's UI is an area with certain shortcomings that need improvement."
"We need an API to automatically retrieve metrics and data about backend activity so we can generate client reports."
"The Huntress is not a standalone solution. It really needs to be used with something else such as Microsoft Defender or another antivirus solution. It would be nice to see the product fleshed out by the Huntress team and include the antivirus solution part as well. I want it to be a full-fledged XDR product. It would push the tool to a higher price range but it would be nice to see the fleshed out features. I want them to integrate more features from the XDR realm."
"I'd like Huntress to implement a component that can analyze network traffic for specific sites."
"I am anxiously watching to see how they evolve their MDR for Office 365. If anything, I would like more automated remediation capabilities in their MDR for Office 365."
"I would like the API to be a little better. They are getting there."
"Some of Huntress' reporting could be improved."
"One area for improvement in Huntress would be to allow for PSA integration from a specific IP address or hostname for better security measures."
"One of the biggest pain points is that it's not really ransomware-oriented. They will be able to catch some, but that's where Sentinel One is a better player compared to Webroot."
"Its detection capability for certain attacks should be improved. It should have better and wider detection for certain malware attacks. It could also have some sort of RMN."
"The only complaint I have with Webroot is its inability to prevent UoD phishing and its inability to check against bots or block anti-attacks. Plus the URL server is in zero-definition."
"I believe that Webroot Business Endpoint Protection should offer a more modern UI."
"Webroot is very reactionary. It waits until the threat is active within memory to try and detect it. They need better pre-execution detection and prevention."
"I want Webroot to be easier to use and set up. It is not very intuitive."
"The solution could improve by providing better ransomware protection."
"Unified threat management (UTM) integration."
More Webroot Business Endpoint Protection Pricing and Cost Advice →
Huntress is ranked 13th in Endpoint Protection Platform (EPP) with 12 reviews while Webroot Business Endpoint Protection is ranked 34th in Endpoint Protection Platform (EPP) with 30 reviews. Huntress is rated 9.4, while Webroot Business Endpoint Protection is rated 8.2. The top reviewer of Huntress writes "Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "Lightweight and not hard to set up however, does not offer good reporting". Huntress is most compared with SentinelOne Vigilance, Blackpoint Cyber MDR, CrowdStrike Falcon Complete, Arctic Wolf Managed Detection and Response and Sophos MDR, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, HP Wolf Security, SentinelOne Singularity Complete and Cynet. See our Huntress vs. Webroot Business Endpoint Protection report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.