We compared Huntress and Webroot Business Endpoint Protection based on our users reviews.
Our conclusion is that Huntress and Webroot Business Endpoint Protection have simple and convenient setup processes. Huntress is known for its expertise in threat-hunting and its 24/7 SOC, while Webroot is praised for its user-friendly interface. Huntress could improve its reporting and integration with other solutions, while Webroot could enhance its reporting system and integrate better with reliable OTXs. Huntress has generally favorable pricing, while Webroot is considered affordable and cost-effective. Customer support for both products has received mixed feedback, with some users finding it responsive and others experiencing issues.
We primarily focused on the topics below:
The summary above is based on 15 interviews we conducted with Huntress and Webroot Business Endpoint Protection users. To access the interviews' full transcripts, download our report.
"The price is low and quite competitive with others."
"The stability is very good."
"NGAV and EDR features are outstanding."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"Forensics is a valuable feature of Fortinet FortiEDR."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"It catches things that no one else catches. We occasionally have things slip through antivirus and other things, but Huntress catches them. It is awesome as an additional layer of defense on top of other things."
"We don’t have the required staff to watch the issues that are happening. It is good to have a team from Huntress who can watch the logs 24/7. The tool’s automatic remediation is also fantastic. The solution’s interface is also nice and easy to use. The Huntress team saves us time by going through the issues."
"Scalability-wise, I rate the solution a ten out of ten...I rate the technical support a ten out of ten."
"It is very easy to use. It is a great solution. They are one of the better vendors that I have ever worked with since I have been in the industry."
"While threat hunting is undoubtedly the most valuable feature, the combination of IP scanning, foothold identification, and canary monitoring has also proven to be incredibly beneficial."
"I have found it valuable that this solution is always there and always armed."
"Huntress helps by highlighting potential issues, allowing us to take proactive measures."
"Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
"The initial setup is not complex at all. It's very straightforward."
"Low performance requirements."
"There aren't any features that really stand out — I just want it to keep malware out of my system. To date, I haven't had any malware in my system."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"Speed"
"The solution is very simple and straightforward to use."
"Its ease of installation is valuable. It has been a low-resource tool and the continuous updates in the past have made it attractive from the standpoint of the trust level on the protection."
"The solution has many features. It is very easy to define and set the policies based on the user groups, it does not take up a lot of resources in operation, and has provided us with a good track record of protection."
"The dashboard isn't easy to access and manage."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"Cannot be used on mobile devices with a secure connection."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"Intelligence aspects need improvement"
"I haven't seen the use of AI in the solution."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"Detections could be improved."
"The Huntress is not a standalone solution. It really needs to be used with something else such as Microsoft Defender or another antivirus solution. It would be nice to see the product fleshed out by the Huntress team and include the antivirus solution part as well. I want it to be a full-fledged XDR product. It would push the tool to a higher price range but it would be nice to see the fleshed out features. I want them to integrate more features from the XDR realm."
"Their EDR can have increased coverage for Macintosh. They do not fully secure Macintosh computers."
"One area for improvement in Huntress would be to allow for PSA integration from a specific IP address or hostname for better security measures."
"Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."
"The solution's UI is an area with certain shortcomings that need improvement."
"Some of Huntress' reporting could be improved."
"The application control system could benefit from improvements in identifying and managing both whitelisted and blacklisted applications."
"I would like the API to be a little better. They are getting there."
"The solution could improve by providing better ransomware protection."
"There should be a Webroot Business Endpoint Protection mobile app."
"I'm not happy with Webroot Business Endpoint Protection, for only one reason. It seems that it slows down my interface when I'm doing programming in Microsoft Access, tremendously."
"We need to know more details about how the virus interacted with the computer."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
"The only complaint I have with Webroot is its inability to prevent UoD phishing and its inability to check against bots or block anti-attacks. Plus the URL server is in zero-definition."
"They should provide more information on the type of cyber attacks."
"I want Webroot to be easier to use and set up. It is not very intuitive."
More Webroot Business Endpoint Protection Pricing and Cost Advice →
Huntress is ranked 13th in Endpoint Protection Platform (EPP) with 12 reviews while Webroot Business Endpoint Protection is ranked 34th in Endpoint Protection Platform (EPP) with 30 reviews. Huntress is rated 9.4, while Webroot Business Endpoint Protection is rated 8.2. The top reviewer of Huntress writes "Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "Lightweight and not hard to set up however, does not offer good reporting". Huntress is most compared with SentinelOne Vigilance, Blackpoint Cyber MDR, CrowdStrike Falcon Complete, Arctic Wolf Managed Detection and Response and Field Effect MDR, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, HP Wolf Security, Intercept X Endpoint and Panda Adaptive Defense 360. See our Huntress vs. Webroot Business Endpoint Protection report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.