+
Visit Website

About

Huntress delivers a powerful suite of endpoint protection, detection and response capabilities—backed by a team of 24/7 threat hunters—to protect your business from today’s determined cybercriminals. Huntress protects your business throughout the modern attack lifecycle—defending against threats like ransomware, malicious footholds, and more. Our security experts take care of the heavy lifting with 24/7 threat hunting, world-class support and step-by-step instructions to stop advanced attacks. We review all suspicious activity and only send an alert when a threat is verified or action is required—eliminating the clutter and false positives found in other platforms. With one-click remediation, handwritten incident reports and powerful integrations, even non-security staff can use Huntress to swiftly respond to cyber events.

About

One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.

About

ThreatLocker is a Zero Trust Platform that prevents cyber threats by blocking unknown applications, enforcing least privilege, and controlling what can run across your environment. Using Allowlisting, Ringfencing, Network Control, and more, ThreatLocker stops ransomware, zero-day attacks, and unauthorized activity before execution, rather than relying on detection after the fact. Built for modern IT and cybersecurity teams, the platform delivers centralized visibility and policy management across endpoints, users, and applications. ThreatLocker reduces attack surface, limits lateral movement, and supports compliance with detailed audit logs. With fast deployment, a large built-in application library, and streamlined approvals, organizations can strengthen security while minimizing operational overhead and maintaining business continuity.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity solution for IT teams

Audience

Organizations and businesses that want an all-in-one endpoint protection platform

Audience

IT pros looking for a Zero Trust Platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$45 per user per year
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 4.7 / 5
features 5.0 / 5
design 4.7 / 5
support 4.8 / 5

Reviews/Ratings

Overall 4.9 / 5
ease 4.5 / 5
features 5.0 / 5
design 4.5 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Huntress
Founded: 2015
United States
www.huntress.com

Company Information

SentinelOne
Founded: 2013
United States
www.sentinelone.com

Company Information

ThreatLocker
Founded: 2017
United States
www.threatlocker.com

Alternatives

Alternatives

Alternatives

Criminal IP

Criminal IP

AI SPERA
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Categories

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention Features

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Firewall Features

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Access Control (NAC) Features

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Integrations

ThreatAware
Anitian FedRAMP Comprehensive
Auguria
Azure Marketplace
Blackpanda
Blackwell Security
Cisco XDR
Code42 Incydr
Conifers CognitiveSOC
ConnectWise ScreenConnect
Helical
Intezer AI SOC
JupiterOne
Kaseya BMS
MyGlue
Query Federated Search
Recovery Point
Stellar Cyber
The Respond Analyst
Vectra AI

Integrations

ThreatAware
Anitian FedRAMP Comprehensive
Auguria
Azure Marketplace
Blackpanda
Blackwell Security
Cisco XDR
Code42 Incydr
Conifers CognitiveSOC
ConnectWise ScreenConnect
Helical
Intezer AI SOC
JupiterOne
Kaseya BMS
MyGlue
Query Federated Search
Recovery Point
Stellar Cyber
The Respond Analyst
Vectra AI

Integrations

ThreatAware
Anitian FedRAMP Comprehensive
Auguria
Azure Marketplace
Blackpanda
Blackwell Security
Cisco XDR
Code42 Incydr
Conifers CognitiveSOC
ConnectWise ScreenConnect
Helical
Intezer AI SOC
JupiterOne
Kaseya BMS
MyGlue
Query Federated Search
Recovery Point
Stellar Cyber
The Respond Analyst
Vectra AI
Claim Huntress and update features and information
Claim Huntress and update features and information
Claim SentinelOne Singularity and update features and information
Claim SentinelOne Singularity and update features and information