Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCase Studies
Connectworks

Beyond the Tools

The Human Story Behind Connectworks’ Cybersecurity Success

Download Case Study
Products Used

Managed EDR

Managed ITDR

When hackers set their sights on businesses across the Netherlands, Connectworks had a tough choice—adapt or risk it all. With more than 7,000 endpoints protected by only antivirus tools, they needed something more than just another product.

Learn More About Connectworks

Background | A Not-So-Silent Crisis

For Connectworks—an IT service provider nestled along the tranquil canals of the Netherlands—the escalating roar of cyber threats was impossible to ignore. Focused on protecting small, specialist businesses, Connectworks suddenly found themselves racing to outmaneuver malicious hackers. For years, Connectworks relied on antivirus solutions. But those tools couldn’t keep up. Ransomware and identity-based attacks were no longer distant rumblings—they now thundered in the quaint Dutch town of Almelo, home to Connectworks and their clients.  “We weren’t the easiest target, but we weren’t the hardest either,” says Thijmen Bosman, Chief Commercial Officer at Connectworks. “It was only a matter of time before something slipped through.”

The Risk | Close Calls and Mounting Pressure

Throughout 2022, near misses became all too common for Connectworks. One client fell for a phishing scam and narrowly avoided a €100,000 fraudulent transaction (fortunately caught by the bank). Another had their account breached despite using multi-factor authentication (yet fortunately dodged any real damage). These events chipped away at the facade of safety. Each attack wasn’t just a technical nuisance but a potential business-ending catastrophe.
“We wouldn’t have been legally liable for their losses,” Bosman admits. “But morally? We weren’t just going to stand by and watch our clients lose it all.” Yet their antivirus tools could only do so much. Attacks became more sophisticated day by day. With more than 7,000 endpoints (and growing) to protect, Connectworks needed a more precise, more effective strategy. And they needed it yesterday.

I needed someone who’d show up when it mattered most for us and our clients

The Quest | Finding a True Ally

Bosman wasn’t looking for just another security tool. He was in search of a new approach. While many SaaS providers offer excellent technologies and services, Bosman needed the assurance of reliable, ongoing support. “I needed someone who’d show up when it mattered most for us and our clients,” he explains. Having been a long-time partner of Autotask and Datto RMM, Connectworks had greatly benefited from their robust solutions. Kaseya’s offerings, like K365 and RocketCyber, were strong contenders, providing budget-friendly options with the potential for service consolidation. But Bosman opted to take a step back and explore alternative strategies to ensure his company’s evolving needs were fully met. After months of careful research, he narrowed his options to SentinelOne, CrowdStrike, and Huntress. All were solid choices—but one clearly had more to offer than just technology.

The Answer | A True Partner’s Worth Can’t Be Measured 

“The choice came down to partnership,” Bosman explains. “Huntress didn’t just hand us a product. Unlike most vendors, they actually worked alongside us to make everything we wanted feasible.” 

Huntress’ “people-first” approach stood out right away. Their Europe-based team immediately began collaborating with Bosman. They offered free trials, designed a custom opt-out campaign for Connectworks’ clients, and created a pricing model aligned with Bosman’s mass adoption goals. Huntress began to forge a meaningful relationship with Bosman and the entire Connectworks team. “They genuinely wanted to provide value to our customers instead of just eagerly making a sale,” Bosman recollects. 

In the end, Huntress wasn’t the cheapest contender, but their people-first focus couldn’t be ignored. “Sure, there were less-pricey options,” Bosman acknowledges. “But Huntress is there when it counts, and that reliability and predictability is priceless.”

The First Victory | Shutting Down Endpoint Threats

The partnership began in April 2023, starting with Huntress’ Managed EDR (Endpoint Detection and Response). The results were immediate. The change was plain to see. “There were no more ‘what do we do now?’ moments,” Bosman says. Instead, his team received clear, easy-to-follow remediation instructions from the experts in the Huntress Security Operations Center (SOC).

Connectworks rolled out Managed EDR to nearly 7,000 of their endpoints using an opt-out campaign. By December, nearly all of their clients had adopted the solution. For the first time in a long time, Bosman and his team could breathe easier.
But the sighs of relief were short-lived. Threat actors adapted quickly. If they couldn’t crack the machines, they’d go for the people using them.

The Second Threat | Identity Risks Emerge 

By late 2023, identity attacks on Microsoft 365 users were escalating. Though none had truly jeopardized his clients yet, Bosman knew account compromises could expose sensitive data, cripple independent businesses, and threaten everything Connectworks stood for. If endpoint breaches were explosions, identity attacks were nuclear bombs.  Once again, Huntress was ready. Seeing the success of their Managed EDR rollout, Connectworks expanded their partnership to include Huntress’ Managed ITDR (Identity Threat Detection and Response). This solution shuts down vulnerabilities like business email compromise, session hijacking, and unauthorized access, so user credentials stay safe and out of the wrong hands. The rollout strategy was seamless. Using their now familiar opt-out campaign model, Connectworks scaled Managed ITDR to nearly all identities under their watch within months.


The Turning Point | Embracing People-Powered Security 

“We had some low-security alerts, but we didn’t even consider them notable incidents because Huntress caught them so quickly,” Bosman explains.

Huntress’ 24/7, industry-defining SOC gave Connectworks clear, actionable remediation steps every time, empowering their team to resolve incidents confidently. The seamless integration with Autotask also ensured efficient workflows, so the Connectworks team could focus on real threats instead of drowning in false positives.


“The Huntress SOC isn’t just a bunch of automated alerts,” Bosman says. “It’s real people. They don’t just tell you there’s a problem—they’re there for you, helping you fix it.”

Results | Trust Built on Action 

By partnering with Huntress, Connectworks has seen results that would surprise even the most optimistic IT professional, like: 

  • Zero endpoint breaches. Every one of their nearly 7,000 endpoints stayed secure.
  • 30% faster incident response times. It’s estimated that Huntress’ actionable alerts significantly reduced Connectworks’ time to resolve issues.
  • Stronger client trust. Their proactive stance on identity and endpoint defenses cemented their reputation as a top-tier outsourced IT partner for Dutch businesses.

“We were honest with ourselves,” Bosman admits. “We’ll never have the same level of experience as Huntress when it comes to incident response.”  Bosman acknowledges that while his team knows the playbook for security best practices, real-world incident response is a game they don’t want to be part of. “We’ve had very few incidents, which is great, but it also means we’re not seasoned when one hits.” That’s why they rely on the Huntress SOC. With expertise gained from handling thousands upon thousands of incidents, the SOC always delivers intelligent judgment, clear context, and decisive action that automation just can’t.  Standalone incident response firms can be expensive and often less effective, creating bottlenecks as two vendors struggle to coordinate. Because Huntress builds and owns their technology stack, the SOC and the tech work as a cohesive unit. It’s due to this “one team” approach that Connectworks gained a seamless, expert-driven incident response process that fills critical gaps and amplifies the value they deliver to clients. Or, as Bosman sums up, “Our clients sleep better at night. And so do we.”


What’s Next | Staying Ahead of the Curve

Bosman wasn’t just looking to stop cyber threats—he was looking for a reliable partner he could trust, no matter the time or place. That’s exactly what he found with Huntress. Now, as he collaborates with them to implement Managed SIEM (Security Information and Event Management), he adds he’s eager to adopt Managed SAT (Security Awareness Training) as soon as it’s available in Dutch.

“Huntress isn’t just another vendor,” he says. “They’re part of our team. And in this line of work, partnership makes all the difference.” For Bosman and the wider cybersecurity community, Huntress prioritizes the human element with proactive communication, ongoing education, and expert guidance. This “people-first” focus means Connectworks’ clients are always prepared for whatever threats lie ahead.


Huntress isn’t just another vendor. They’re part of our team. And in this line of work, partnership makes all the difference.


Connectworks
Contact
Thijmen Bosman
Location
Almelo, Netherlands
About

Since 2004, Connectworks has been driving innovation and progress in the IT sector. Recognizing the critical role IT plays in business operations, they lead the industry with smart, sustainable solutions tailored to your needs. Their personalized approach ensures seamless integration with your business processes, supported by direct communication with a dedicated expert who truly understands your organization. By enhancing efficiency and security, Connectworks empowers you to elevate the quality and performance of your business operations. For more details, visit connectworks.nl.

Share this Success Story

Download Case Study
Share

Other Case Studies

  • One Click from Catastrophe
    One Click from Catastrophe
    Learn more about Trumbull Tech and Huntress Managed ITDR helped an Accountant avoid financial ruin.
  • The MSP Who Saw It All
    The MSP Who Saw It All
    Key Methods had seen their share of security incidents. But when one of their clients suffered a mass-isolation event, they realized they were flying blind. Attackers had accessed sensitive data, but without clear logs, they were left scrambling.
  • Boone County Schools
    Boone County Schools
    For Boone County, the value goes beyond alerts and dashboards. Huntress has helped the district build a more proactive security culture—one grounded in real risk, shaped by the realities of public education, and backed by an elite team that can step in when needed.
  • Homer Community Consolidated School District 33C
    Homer Community Consolidated School District 33C
    When a public school district needed to meet new cyber insurance requirements, they had to find a solution that wouldn't take time or budget away from students. See how their small IT team used Huntress to get 24/7 coverage across endpoints, speed up remediation, and build a stronger security culture.
  • Five Nines Technology Group
    Five Nines Technology Group
    Five Nines helps 240+ businesses stay secure. Facing rising cyberattacks like password-spray incidents, they adopted proactive security measures to protect clients with Huntress.
  • How Do You Sleep at Night?
    How Do You Sleep at Night?
    For UK-based managed service provider Greystone Technology, Huntress is more than just a product – it’s peace of mind.
  • Integrated Technology Systems
    Integrated Technology Systems
    Integrated Technology Systems partnered with Huntress to enhance their offerings, streamline their product stack, and boost profitability, all while keeping client security at the forefront.
  • Securing Customers
    Securing Customers
    In the wake of supply chain attacks targeting SMBs, F1 Solutions went all in on Huntress to secure customers.
  • RAFTRx
    RAFTRx
    Huntress plays a critical role in RAFTRx's business growth, providing cybersecurity expertise. This collaboration positions cybersecurity as a key driver for RAFTRx's expansion.

Add Cyber Experts to Your Arsenal

See how the global Huntress SOC can augment your team with 24/7 coverage and unmatched human expertise. Start your free trial today.

Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy