Huntress is a cloud-based cybersecurity platform, which helps organizations track threats, vulnerabilities, and exploits. With its dashboard, security professionals can monitor active incidents, review investigations, receive custom incident reports, and respond to threats in an automated manner.
Huntress is a cloud-based cybersecurity platform, which helps organizations track threats, vulnerabilities, and exploits. With its dashboard,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline security. Blackpoint MDR technology is purpose-built to provide an agile response to attacks, offering continuous visibility and protection across an ever-changing attack surface.
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.9 /5
(17)

Ease of Use

4.8/ 5

Features

4.8/ 5

Customer Service

4.9/ 5

Value for Money

4.8/ 5

Overall rating

4.8 /5
(34)

Ease of Use

4.6/ 5

Features

4.5/ 5

Customer Service

4.9/ 5

Value for Money

4.5/ 5

Total features 19

  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Behavioral Analytics
  • Continuous Monitoring
  • Customizable Reports
  • Dashboard
  • Data Visualization
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Incident Management
  • Incident Reporting
  • Issue Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning

Total features 28

  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Behavioral Analytics
  • Continuous Monitoring
  • Customizable Reports
  • Dashboard
  • Data Visualization
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Incident Management
  • Incident Reporting
  • Issue Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Bitdefender Antivirus Plus
  • Cisco Meraki
  • ConnectWise PSA
  • Malwarebytes for Business
  • Microsoft Defender for Business
  • Microsoft Defender for Endpoint
  • SentinelOne
  • ServiceNow
  • WatchGuard Endpoint Security
  • Webroot Business Endpoint Protection
  • Bitdefender Antivirus Plus
  • Cisco Meraki
  • ConnectWise PSA
  • Malwarebytes for Business
  • Microsoft Defender for Business
  • Microsoft Defender for Endpoint
  • SentinelOne
  • ServiceNow
  • WatchGuard Endpoint Security
  • Webroot Business Endpoint Protection