We compared Huntress and Webroot Business Endpoint Protection based on our users reviews.
Our conclusion is that Huntress and Webroot Business Endpoint Protection have simple and convenient setup processes. Huntress is known for its expertise in threat-hunting and its 24/7 SOC, while Webroot is praised for its user-friendly interface. Huntress could improve its reporting and integration with other solutions, while Webroot could enhance its reporting system and integrate better with reliable OTXs. Huntress has generally favorable pricing, while Webroot is considered affordable and cost-effective. Customer support for both products has received mixed feedback, with some users finding it responsive and others experiencing issues.
We primarily focused on the topics below:
The summary above is based on 15 interviews we conducted with Huntress and Webroot Business Endpoint Protection users. To access the interviews' full transcripts, download our report.
"Forensics is a valuable feature of Fortinet FortiEDR."
"The product detects and blocks threats and is more proactive than firewalls."
"It is stable and scalable."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The setup is pretty simple."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Huntress' best feature is the threat-hunting expertise that is part of their 24/7 SOC."
"Huntress helps by highlighting potential issues, allowing us to take proactive measures."
"While threat hunting is undoubtedly the most valuable feature, the combination of IP scanning, foothold identification, and canary monitoring has also proven to be incredibly beneficial."
"It is incredibly efficient for our engineering team because Huntress provides all the information needed to fix issues, not just flag them."
"I have found it valuable that this solution is always there and always armed."
"It catches things that no one else catches. We occasionally have things slip through antivirus and other things, but Huntress catches them. It is awesome as an additional layer of defense on top of other things."
"Foothold detection is a valuable feature, acting as a valuable second set of eyes for both us and our clients."
"We don’t have the required staff to watch the issues that are happening. It is good to have a team from Huntress who can watch the logs 24/7. The tool’s automatic remediation is also fantastic. The solution’s interface is also nice and easy to use. The Huntress team saves us time by going through the issues."
"The solution has many features. It is very easy to define and set the policies based on the user groups, it does not take up a lot of resources in operation, and has provided us with a good track record of protection."
"Doesn't consume resources or affect the computer performance at all."
"Its ease of installation is valuable. It has been a low-resource tool and the continuous updates in the past have made it attractive from the standpoint of the trust level on the protection."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"We've not had any issues with scalability. If an organization needs to expand, they can do so quite easily."
"I haven't observed any of the instabilities in the solution. It is a stable solution."
"The solution is very simple and straightforward to use."
"It is very light. It is the only solution that can be installed on a machine that already has an antivirus. It is a pretty complete solution."
"The dashboard isn't easy to access and manage."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"Making the portal mobile friendly would be helpful when I am out of office."
"I haven't seen the use of AI in the solution."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"The solution is not stable."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"In the next release, I'd like to see more intuitive dashboards."
"I would like the API to be a little better. They are getting there."
"I'd like Huntress to implement a component that can analyze network traffic for specific sites."
"The solution's UI is an area with certain shortcomings that need improvement."
"One area for improvement in Huntress would be to allow for PSA integration from a specific IP address or hostname for better security measures."
"Huntress' Process Insights feature could benefit from more robust search and filtering capabilities."
"The application control system could benefit from improvements in identifying and managing both whitelisted and blacklisted applications."
"I am anxiously watching to see how they evolve their MDR for Office 365. If anything, I would like more automated remediation capabilities in their MDR for Office 365."
"There should be a Webroot Business Endpoint Protection mobile app."
"Technical support is not the best. It's hard to get a hold of them if we need help. It's something that definitely needs improvement."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
"It would be great if there was a feature which would allow you to scan an individual file on an endpoint user's computer."
"Reporting system could be improved."
"We need to have a stronger defense against CryptoLock and other attackers."
"One of the biggest pain points is that it's not really ransomware-oriented. They will be able to catch some, but that's where Sentinel One is a better player compared to Webroot."
"We need to know more details about how the virus interacted with the computer."
More Webroot Business Endpoint Protection Pricing and Cost Advice →
Huntress is ranked 13th in Endpoint Protection Platform (EPP) with 12 reviews while Webroot Business Endpoint Protection is ranked 34th in Endpoint Protection Platform (EPP) with 30 reviews. Huntress is rated 9.4, while Webroot Business Endpoint Protection is rated 8.2. The top reviewer of Huntress writes "Is the easiest tool we've ever deployed, is cost-effective, and significantly improved our security posture". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "Lightweight and not hard to set up however, does not offer good reporting". Huntress is most compared with SentinelOne Vigilance, Blackpoint Cyber MDR, CrowdStrike Falcon Complete, Arctic Wolf Managed Detection and Response and Sophos MDR, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, HP Wolf Security, SentinelOne Singularity Complete and Cynet. See our Huntress vs. Webroot Business Endpoint Protection report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.