What Is Identity Security Posture Management (ISPM)?
On This Page
FAQs
A basic ISPM tool would scan your Microsoft 365 environment and flag an account for "Dave" who left the company three months ago, but his account was never disabled. This is a "dormant account" and a huge, unnecessary security risk that ISPM helps you find.
IAM is the "gatekeeper." It gives people keys (provisioning) and checks their ID at the door (authentication). ISPM is the "inspector." It comes in after IAM and double-checks if the right keys were given to the right people, or if any old, forgotten keys are lying around.
Huntress provides managedIdentity Threat Detection and Response. It starts by running an Identity Security Assessment (its ISPM-like feature) to find risks like rogue apps and shadow workflows. But the main part is the 24/7 SOC service that hunts for active attacks, investigates them, and can automatically isolate a compromised account to stop a breach.
Absolutely. Small businesses are the perfect target for these attacks because they often have stretched IT teams. They can't afford to hire their own 24/7 SOC. A managed solution gives them that enterprise-grade, human-led protection without the complexity or high cost.
MFA is essential, but it's not foolproof. Attackers can still bypass it (using "MFA fatigue" or session hijacking), and it doesn't fix underlying posture issues. ISPM finds the gaps, like an admin account not enrolled in MFA. A managed service (like Huntress's) then watches for the attacker who does manage to bypass MFA.
This is a malicious or risky third-party application that a user might accidentally grant permissions to. For example, a fake "productivity" app that, once approved, gets access to read all their email and files. The Huntress Identity Security Assessment specifically hunts for these.
It means you're not just buying a tool that just sends you automated alerts. A "managed" solution, like Huntress's, means their 24/7 human SOC team does the work for you. They investigate alerts, filter out the noise, confirm real threats, and then send you plain-English reports on how to fix them (or even handle the response).
No. ISPM is great at finding potential risks (the "unlocked window"). It is not designed to stop an active attack (the "burglar climbing in"). That's why Huntress combines ISPM-like posture checks with 24/7 active threat hunting. You need both to be secure.