Glitch effect

Identity Is the New Endpoint: The Next Evolution in Threat Detection

Hackers aren’t breaking into your network—they’re just logging in. Identity has become the easiest way into your environment, and attacks like session hijacking, stolen tokens, and malicious OAuth apps can make bypassing your defenses easy.

That’s why we built Huntress Managed ITDR: It’s fully managed identity threat detection and response, purpose-built to shut down the identity tradecraft hackers love. 

In this session, we’re unveiling the new Managed ITDR powered by our latest capability, Rogue Apps, built from the ground up to protect Microsoft 365 environments without the noise or guesswork.

Join our identity experts as we dig into:

  • Rogue apps real-world dangers and how they infiltrate Microsoft 365 environments 

  • How attackers use "legit" apps like eM Client and Rclone as stealthy backdoors—and how we spot and shut them down

  • What it takes to stop identity-based attacks like session hijacking and credential theft before they escalate 

  • Identity tradecraft in the wild 

  • What’s coming soon in Huntress Managed ITDR

Glitch effectGlitch effect
Watch the Webinar
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.
Matt Kiely
Principal Security Researcher
LinkedIn icon
Erin Meyers
Principal Product Marketing Manager
LinkedIn icon
Rich Mozeleski
Staff Product Manager

[PH] Learn More About Phishing

[PH] Huntress delivers everything you want from a security tool, all designed with the unique needs of outsourced IT and security teams in mind.
[PH] Phishing attempts can show up as messages from your bank, your boss, your utility providers, or even the government. One click from one user can compromise an entire network and inadvertently let hackers deploy ransomware, steal information, or worse.
[PH] The median time it takes for a user to click a link and enter information is less than 60 seconds. With a turnaround time that quick, it's no wonder phishing is one of the preferred methods used by hackers. (2024 Verizon Data Breach Report)
Glitch effectGlitch effectBlurry glitch effect