We compared Huntress and CrowdStrike Falcon Complete based on our users reviews.
Our conclusion is that Huntress and CrowdStrike Falcon Complete have distinct strengths and weaknesses. Huntress is highly regarded for its expertise in identifying threats and its constant monitoring capabilities, supported by advanced AI. However, it falls short in terms of detailed reporting and compatibility with other antivirus solutions. On the other hand, CrowdStrike Falcon Complete provides a lightweight agent, vulnerability assessment, and robust threat intelligence. It also offers a comprehensive response to threats and user-friendly dashboards. Nevertheless, it lacks features such as application control and user risk scoring, and some users find the pricing to be high.
In summary, Huntress excels in proactive defense and threat hunting, while CrowdStrike Falcon Complete offers a comprehensive response to threats and strong threat intelligence.
We primarily focused on the topics below:
Ease of Deployment and Service and Support: The setup process for Huntress is simple and uncomplicated, with fast installation and minimal resource demands. Similarly, CrowdStrike Falcon Complete also offers a straightforward setup, although it may be more challenging for extensive networks lacking an automated ruling platform. Deployment times for CrowdStrike can vary from one day to one month, whereas Huntress only necessitates one person for deployment. Huntress' customer service is highly regarded for its quick and effective help, earning a flawless rating. On the other hand, CrowdStrike Falcon Complete's customer service receives varied feedback. Some customers appreciate its excellent support, while others express dissatisfaction with its slow response time and areas that require enhancement.
The summary above is based on 43 interviews we conducted with Huntress and CrowdStrike Falcon Complete users. To access the interviews' full transcripts, download our report.
"The most valuable features are the SIEM and the ticketing function; the latter is very smooth and easy to read and understand. We don't have any issues looking at the ticketing information when we're trying to identify what's going on."
"The case interface is Binary Defense MDR's most valuable feature."
"Binary Defense has a human service department that provides live monitoring for our systems."
"The speed at which their services are reactive is valuable. Nowadays, when a threat hits an endpoint, you've got minutes, not hours or days. Their average response time is about four minutes on an alert. For anything that needs to be sent to us, it's about fourteen minutes, which is pretty good. They're the third SOC that I've used in fifteen years. By far, they are the quickest ones to act. When you're looking at prevention, that's a key factor."
"With Binary Defense, we don't just get an alert, but also a detailed rundown of why they're alerting us on it. They tell us what was executed, or the username, script, or IP. That way, we're not wasting time investigating."
"One of the main benefits of Binary Defense MDR is the ability to easily meet with their support team to discuss any issues we encounter."
"The biggest aspect for us is that they are able to conform to our environment and utilize our tools. That way, we still maintain ownership of all the data and access to the applications, and we never lose control of the ability to run the solution ourselves if we need to."
"Among the valuable features are the agent, continuous reporting, and dashboard. It has all the features we need and we haven't had to customize it, other than turning on certain features that we wanted."
"Two of the most valuable features of CrowdStrike Falcon Complete are the remote terminal and unlimited IoCs."
"I would recommend Falcon Complete for anyone looking for a cheaper alternative that's almost the same quality as Cortex."
"CrowdStrike Falcon Complete has stable security."
"Endpoint protection is the most valuable feature of CrowdStrike Falcon Complete at this moment."
"I like Falcon's AI functionality and vulnerability management. That has been so helpful. Falcon Complete can manage vulnerabilities, quarantine threats, and do all kinds of forensic incident analysis. It's a lightweight solution that only uses 1% of the CPU, which is a game changer. Other EDRs have had high CPU usage."
"There are many different modules with this solution where vulnerability and inventory management can be carried out. The solution has a good dashboard and offers a lot of insights into your systems."
"If there is something wrong or not normal in the endpoint CrowdStrike Falcon Complete is very responsive."
"What I found most valuable in CrowdStrike Falcon Complete is that it has a lot of monitoring dashboards and use cases, and I saw that it's a very good product, but my company has only tested it, so it's not been used for real use cases. My company hasn't tested the complete license for CrowdStrike Falcon Complete, so the team hasn't checked the open fiber rooms for zero-day attacks, IOAs and IOCs, or any indicators of fraudulent activities. I was also amazed at the solution and its licensing. My company did a competitive analysis of many EDR solutions, but it went with CrowdStrike Falcon Complete. It's one of the top-rated solutions on CyberRatings as well."
"Scalability-wise, I rate the solution a ten out of ten...I rate the technical support a ten out of ten."
"The EDR product is simple to install. It is low maintenance. All the alerts go to Huntress first, and their analyst team reviews them and sends actionable things our way."
"It is incredibly efficient for our engineering team because Huntress provides all the information needed to fix issues, not just flag them."
"It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry."
"Huntress helps by highlighting potential issues, allowing us to take proactive measures."
"Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
"While threat hunting is undoubtedly the most valuable feature, the combination of IP scanning, foothold identification, and canary monitoring has also proven to be incredibly beneficial."
"We don’t have the required staff to watch the issues that are happening. It is good to have a team from Huntress who can watch the logs 24/7. The tool’s automatic remediation is also fantastic. The solution’s interface is also nice and easy to use. The Huntress team saves us time by going through the issues."
"We should be able to isolate devices faster. They should shorten the time between clicking on a device to contain it and carrying out the action. That would be a welcome improvement."
"The most significant area for improvement is in support for non-English speakers; we're a global organization, so many of our users are not English speakers, which can make interacting with them a challenge. There's no Chinese language support, so we must rely on what we can do with the internet. We don't expect Binary Defense to build a language staff, but details can get lost in translation when we assume the whole world speaks English."
"I would like to see more frequent check-ins with our security status."
"The only area I see for improvement with Binary Defense is their service portal. It could benefit from some enhancements."
"It's hard to think of anything that they need to improve on, but just to point out something, I would like to see them provide advanced XDR."
"If I were shopping for an MDR solution today, I would not only look for a company that has the ability to alert, detect, and remediate, but also the ability to integrate vulnerability management. That's a big thing that they're lacking today."
"We found a couple of bugs in the user interface."
"It's sometimes difficult to know when to engage Binary Defense or TrustedSec, their sister company. TrustedSec is more focused on offensive security, as opposed to the defensive security that the MDR solution provides. It would be awesome if there were a better bridge between that relationship for when we need to get more proactive services or when we need to do a penetration test."
"The installation could always be a bit easier. You need to install it manually at the endpoint."
"The biggest thing is to scan into your Office 365 environment, not from a cloud access security broker standpoint, but from the Secure Access Security Edge standpoint in protecting the Copilot ecosystem. Copilot has become more widely popular than I could have imagined. You need to back up and protect your Office 365 tools anyway, and Copilot is just a high sense of awareness."
"I would like to see them introduce DLP."
"The improvements needed for CrowdStrike Falcon Complete are in the way the agent updates. The overall management of endpoints needs to be better."
"The performance slows down by between 10% and 40%, depending on what type of work the machine is doing."
"CrowdStrike Falcon Complete MDR offers an optional module that might not be cost-effective for all organizations."
"The downside that we see with CrowdStrike is that it is not part of a broader ecosystem. It is an endpoint product. They don't sell firewalls or a broader cybersecurity ecosystem. Some of the behavioral detections could be more robust. It does a good job of stopping common tools and techniques, but when it comes to using Windows utilities, such as PowerShell, etc, it doesn't stop them. These are some of the things where we have been able to get past it. An argument there can be that these are administrative tools, not malware, so maybe it is not its job to stop it, but we see some of the competitive products doing a very good job of detecting behaviors as opposed to malware."
"We're a small organization. I'm not sure how it would fare if you were larger and had more and more users and added complexity."
"I would like the API to be a little better. They are getting there."
"I'd like Huntress to implement a component that can analyze network traffic for specific sites."
"We need an API to automatically retrieve metrics and data about backend activity so we can generate client reports."
"Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."
"In the next release, I'd like to see more intuitive dashboards."
"Their EDR can have increased coverage for Macintosh. They do not fully secure Macintosh computers."
"The application control system could benefit from improvements in identifying and managing both whitelisted and blacklisted applications."
"The solution's UI is an area with certain shortcomings that need improvement."
CrowdStrike Falcon Complete is ranked 1st in Managed Detection and Response (MDR) with 75 reviews while Huntress is ranked 3rd in Managed Detection and Response (MDR) with 12 reviews. CrowdStrike Falcon Complete is rated 8.6, while Huntress is rated 9.4. The top reviewer of CrowdStrike Falcon Complete writes "Great next-generation antivirus with breach warranty and good intrusion protection". On the other hand, the top reviewer of Huntress writes "Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture". CrowdStrike Falcon Complete is most compared with Arctic Wolf Managed Detection and Response, Blackpoint Cyber MDR, Secureworks Taegis ManagedXDR, Sophos MDR and SentinelOne Vigilance, whereas Huntress is most compared with SentinelOne Vigilance, Blackpoint Cyber MDR, Arctic Wolf Managed Detection and Response, Bitdefender MDR and Datto Endpoint Detection and Response (EDR). See our CrowdStrike Falcon Complete vs. Huntress report.
See our list of best Managed Detection and Response (MDR) vendors.
We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.