Hackers Are Evolving—
And So Are We

Explore the latest updates to
The Huntress Security Platform

 

Keep Pace
with Today's Attackers

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. Lorem ipsum dolor sit amet, consetetur sadipscing elitr. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua.

ProxyLogon. Hafnium. PrintNightmare. VSA. ProxyShell. MSHTML.

Hackers are leveling up, and they're actively targeting organizations in the mid-market and below—because they know these companies can't defend themselves. 

Huntress is giving small and midsize businesses (SMBs) a fighting chance. Learn more about our latest platform and service updates below.

What's New?

With this latest release, we're empowering SMBs—and the IT resellers that support them—to better protect their endpoints, quickly quarantine devices and swiftly respond to advanced threats. Our latest update focuses on three core pillars:

Watch the Webinar & Hunt Hackers Down

Dive into the latest Huntress services and features, hear from our team and learn how to strengthen your cyber defenses.

Watch the Webinar

Managed Antivirus

Managed Antivirus (AV) enables you to maximize the value of Microsoft Defender Antivirus—a built-in and often untapped Windows OS security solution—so you can strengthen endpoint protection and improve your margins.

With multi-tenant support from the Huntress dashboard, Managed AV enables you to centrally manage detections and events, monitor scans and protections, set exclusions and execute remediation actions for all protected endpoints. 

Learn More
updated-MAV

24/7 Global Threat Hunting

ThreatOps is Huntress’ backbone: a team of expert human threat hunters who investigate suspicious activity, identify active threats and empower you to swiftly respond to cyberattacks with actionable incident reports and a suite of automated remediation capabilities.

With analysts located in the US, UK and Australia, we're now providing true 24/7 coverage. Hackers don't work 9-5, and neither do we. 

Learn More
threatops-map-p2-01 1

Host Isolation (Beta)

When faced with any type of cyberthreat, the ability to respond quickly is critical. Host Isolation provides the ability to quickly block incoming and outgoing network activity on infected hosts, significantly reducing the risk of malware spreading across a network.

During isolation, Huntress remains connected to the host, allowing you to authorize remediation steps to resolve active incidents. This feature is launching in public beta, with additional functionality in development.

Learn More
host-isolation-graphic-2-01

Take a Closer Look at Huntress

Get a personalized tour of The Huntress Security Platform—schedule your demo today.
Schedule a Demo

Defenders, Assemble

We're doubling down on our commitment to deliver greater cybersecurity to the 99%—and our team is growing. We've got decades of collective experience from the Air National Guard, CyberOps, NSA, DoD, and private sector organizations like Mandiant/FireEye, Tanium, Tenable and more.

Meet some of the key players powering our next phase of growth and innovation.

Caleb Stewart

Security Researcher

Dave Kleinatland

Security Researcher

Dina Bruzek

SVP of Product & Engineering

Ed Murphy

Director of Product

Jamie Levy

Director of R&D

John Hammond

Senior Security Researcher

Ken Culver

Director of Engineering

Max Rogers

Head of ThreatOps Center

Roger Koehler

VP of ThreatOps

Andrew Kaiser

VP of Sales

Mike LaPeters

Chief Revenue Officer

Robert Statsky

VP of Partner Success

Already a Partner?

If you're a Huntress partner, simply log into your portal to access these new updates. You can also view the support pages for Managed Antivirus and Host Isolation to learn more.
Log In