Glitch effect

Huntress Resource Center

Welcome to your go-to destination for cybersecurity resources and education. Dig in and find a range of materials made to empower users of all levels with the knowledge and tools to defend against evolving cyber threats.

Huntress social logo
Featured |
eBook

Solving the SIEM Problem

eBook
September 3, 2024
Solving the SIEM Problem
Glitch effectBlue ellipse
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effect
Teal gradient Glitch effect
Showing
Showing
of
Showing
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress social logo
Report

Small-Business G2 Grid® Report for Endpoint Detection & Response (EDR)

Report
December 19, 2023

Looking to understand your Endpoint Detection and Response options? With so many products to choose from, it can be hard to know which solutions deliver real value, especially with most EDRs not being built for the needs of small and mid-sized organizations. But authenticated reviews from companies like yours can help you know what to expect from a tool.  

Read the report drawn from up-to-date user reviews, Small-Business G2 Grid® Report for Endpoint Detection & Response (EDR), to see how Huntress compares to other platforms.

  • Understand how EDR fits into a security stack
  • Learn about the G2 Grid® methodology
  • See rankings of EDR products, including ease of doing business, quality of support, ease of use, and more.
Text Link
Huntress social logo
eBook

The Huntress Advantage: How Huntress Protects SMBs

eBook
December 19, 2023
Text Link
Huntress social logo
Report

The State of Cybersecurity for Mid-Sized Businesses in 2023

Report
December 19, 2023

Cyber attacks are the biggest threat to businesses like yours. Are you at risk?

New research conducted by Virtual Intelligence Briefing (VIB) reveals that 1 in 4 mid-sized businesses suffered a cyber attack or were unsure if they suffered an attack in the last 12 months.

The report, which surveyed 250+ IT professionals in mid-sized businesses, also found that many feel understaffed, under-resourced and unprepared to face today’s evolving threats. The most significant challenges include:

  • 61% of respondents do not have dedicated cybersecurity experts in their organization
  • 47% of respondents do not have an incident response plan
  • 27% of respondents do not have cyber insurance coverage

Download the full research report to dive into where mid-sized businesses have critical gaps in both talent and tools, how cybersecurity spending and outsourcing are trending, and how businesses like yours can better defend against cyber attacks.

Text Link
Huntress social logo
eBook

The MSP Cybersecurity Journey: Guiding Your Customers Toward Success

eBook
December 19, 2023

The teams at Huntress & DNSFilter teamed up to create a guide for MSPs on how to tailor the security conversation with their clients based on maturity. After reading, you'll feel confident answering:

  • What security measures should my customers take as their business grows?
  • How can I counsel my customers on security and relate it to what matters most?
  • What should they prioritize when IT budgets are constrained?
Text Link
Huntress social logo
On-Demand Webinar

What Have You Done for Me Lately: Communicating the Value of Cybersecurity in Your QBRs

On-Demand Webinar
December 19, 2023

Leading a quarterly business review (QBR) is a great way to reinforce the value of your products and services to your clients.

But when it comes to cybersecurity, no news is good news. So how do you communicate that in your QBR?  

To get some tried-and-true advice, we’re bringing together two experts. Join Alex Farling of Lifecycle Insights and Ethan Tancredi of Huntress as they explore:

  • How to get more out of your QBRs and how to get started if you need some guidance
  • How to answer the question, “we haven’t been hacked, what am I paying you for?”
  • How to include the hot topic of cyber insurance into your client conversations

Mark your calendar and get ready to learn how to have meaningful QBRs that won’t leave clients wondering, “what have you done for me lately?”

Text Link
Huntress social logo
On-Demand Webinar

What Every MSP Should Know about Cyber Insurance

On-Demand Webinar
December 19, 2023

It's no surprise that cyber insurance is a hot topic in the MSP community. The list of carrier requirements continues to grow, and your clients may be relying on you for advice and guidance on their policies. Andrew Meier of Huntress and Wes Spencer of FifthWall Solutions will dive deep into cyber insurance from a service provider’s perspective. We’ll share tips and insights on:

  • What are cyber controls, and what this means for cyber insurance
  • How carriers develop their requirements (and how to understand them)
  • Why endpoint detection and response (EDR) is becoming a standard
  • How to handle sales objections and illustrate the cost of a breach to your clients

Text Link
Huntress social logo
On-Demand Webinar

Understanding the Operational Impact of GDAP

On-Demand Webinar
December 19, 2023

As a response to the partner community's requests for increased access and control, Microsoft has changed its Delegated Admin Privileges (DAP) authentication control to Granular Delegated Admin Privileges (GDAP).

The transition is well underway.

Although Microsoft has started deprecating DAP authentication, many partners and service providers have not begun the process and still have many questions. To help ease the transition, the expert team at Huntress is here to help you navigate this change and understand the impact of this update and how you can continue to engage with your customers.

Watch an in-depth discussion as Microsoft MVPs Kelvin Tegelaar, and Nick Ross, Huntress' Dave Kleinatland and Josh Lambert provide a breakdown of GDAP and how to navigate this new security control.

During this informative webinar, we will review:

  • What is GDAP and what are its capabilities
  • The impact of GDAP on external integrations
  • The advantages of appropriate GDAP privileges
  • Steps you can take as a service provider to ensure a smooth transition
  • How to adopt GDAP best practices to keep your Microsoft CSP portal secure

By watching this webinar, you will be fully armed to set up GDAP for success and get the control you need.

Text Link
Huntress social logo
On-Demand Webinar

A Peek Inside Threat Research: Dissecting a RAT

On-Demand Webinar
December 18, 2023

There’s no denying the importance of security software in today’s fight against cybercriminals—but automation and alerting is only half the battle. In this on-demand webinar, Huntress Senior Security Engineer Dave Kleinatland highlights the importance of moving beyond automation with human threat hunting—and takes an under-the-hood look at a RAT to show how IT resellers can identify and respond to modern threats.

Watch Huntress Senior Security Engineer Dave Kleinatlant dissect a RAT and highlight the importance of human threat hunting in modern cybersecurity.

Text Link
Huntress social logo
On-Demand Webinar

Back to Security Basics

On-Demand Webinar
December 18, 2023

You’ve added the right tools to your security stack and have checked every acronym box. But how often are you ensuring you have good cyber hygiene?

The fundamentals of cybersecurity (like MFA and least privilege) are an important part of a strong defense. You may have a basic strategy for your cyber hygiene, but when was the last time your team actually reviewed that strategy?

Watch our webinar to hear our panel of MSPs and experts as they discuss how they ensure good cyber hygiene. Our panelists will share expert tips on how often they review their plans, lessons they learned the hard way and the importance of including clients in the discussion. As an added bonus, all attendees will get a Back to Basics checklist to help you get started.

Read more in Security Hygiene Checklist blog post too.

Text Link
Huntress social logo
On-Demand Webinar

BYOC2: Bring Your Own Command and Control

On-Demand Webinar
December 18, 2023

We live in a security industry where the best mindset is to assume compromise. The hackers are already inside our network—but then what happens? In some cases, they might exfiltrate data or run post-exploitation with their C2 or “Command and Control” access.

In this session, we’ll explore artifacts from a real security incident where evidence of a hacker’s custom C2 framework was left behind. Watch as we pull back the curtain and highlight how this threat actor maintained their access and controlled their victims—and why understanding the offense can help you bolster your defense.

Text Link
Huntress social logo
On-Demand Webinar

Building a Threat-Informed Security Program Using the Cyber Defense Matrix

On-Demand Webinar
December 18, 2023

The proliferation of security tools and solutions has exploded over the past years. Costly ransomware and supply chain attacks have placed significant losses on insurance companies resulting in massive premium increases and in many cases, large reductions in coverage limits.  Cyber insurance questionnaires have become the unregulated “regulator” leaving many businesses and MSPs wondering, do I have the “right” security controls and processes in place?

Sounil Yu has built a model, the Cyber Defense Matrix, that helps to answer that essential question; do I have gaps in my security stack and how can I easily spot what they are?

Join Sounil and Garrett Gross of Huntress to dive into how to understand and apply the Cyber Defense Matrix. During this webinar you will learn:

  • What threats face small and mid-market businesses today
  • How to approach building a security program that addresses the most common ways threat actors attack
  • How the Cyber Defense Matrix helps you understand your current capabilities and identify gaps so you can fortify your defenses

Text Link
Huntress social logo
On-Demand Webinar

The Evolution of The Huntress Managed Security Platform & What’s Next

On-Demand Webinar
December 18, 2023

Let’s be real—the cybersecurity landscape is built to serve enterprise-level organizations that have hefty budgets and limitless resources. That leaves 99% of businesses in the US—those small to midsized businesses—without the resources to afford the protection they need to fight today’s savvy threat actors.

And that’s why Huntress exists.

Join us to hear from our product and leadership teams on how we’ve invested in our managed security platform over the years, where we are today, and the exciting plans we have for product and talent in the near future.

During this webinar, we'll cover:

  • Why we’re investing and building the way we are
  • An overview of our newest managed security platform capabilities
  • Real-world incident recaps that show how our powerful platform features work together to drive increased value
  • A sneak peek at Huntress’ direction in the next 12 to 18 months
  • Live Q&A with our product and leadership teams

We're committed to serving the 99%, and that mission impacts every decision we make. Attend the webinar to see how we’ve put those words into action. 😉

Text Link
Huntress social logo
On-Demand Webinar

The Missing Piece: Detection and Response

On-Demand Webinar
December 18, 2023

Have you heard about Huntress but not sure why you need it? We know that no one says it better than our partners, so we're excited to have Jason Hahn, IT Operations Manager at Computer Solutions join us to share:

  • Why Computer Solutions chose Huntress, and how it continues to earn a spot in their stack
  • How they position layered security to their clients
  • Their experience with the platform and plans for Managed AV
Text Link
Huntress social logo
Whitepaper

The True Value of People-Powered Cybersecurity

Whitepaper
December 18, 2023

Tired of feeling overwhelmed by today’s cybersecurity landscape? You're not alone. There’s a better way to keep up with rising threat levels without breaking the bank or exhausting employees.

This white paper provides valuable insights on how businesses can approach security in a more effective and efficient way—and the key is having a team of always-on security experts, like Huntress' 24/7 SOC, in your back pocket.

Download our white paper to dive into the realities of today's cyber challenges and see how to overcome them. You’ll learn how fully managed, people-powered cybersecurity can reduce the burden on IT teams and save valuable time and money in the long run.

Don't let cybersecurity challenges hold you back. Download our white paper and discover the benefits of people-powered cybersecurity designed for businesses like yours.

Text Link
Huntress social logo
On-Demand Webinar

The Ransomware Lifecycle: From Email to Infection

On-Demand Webinar
December 18, 2023

Email is the easiest and cheapest way for hackers to deliver ransomware. With just a catchy subject line and a few sentences of text, hackers can reel in victims and convince them to click on a weaponized URL or attachment. Vade joins Huntress to explore the lifecycle of ransomware from email to infection. We examine the various techniques hackers use to bypass email filtering and explore the evolution of a ransomware attack when installed on a system.

Watch the webinar to learn:

  • Why email is the primary attack vector
  • How ransomware emails bypass security layers
  • Big data techniques for blocking ransomware emails
  • How to hunt and stop hidden threats
Text Link
Healthcare
Healthcare
Security Awareness Training
Security Awareness Training
Threat Detection
Threat Detection
Selling Cybersecurity
Selling Cybersecurity
Ransomware
Ransomware
Phishing
Phishing
Persistence
Persistence
Mastering Cybersecurity
Mastering Cybersecurity
Incident Response
Incident Response
Endpoint Detection and Response
Endpoint Detection and Response
Cyber Hygiene
Cyber Hygiene
Business Email Compromise
Business Email Compromise
Attacker Tradecraft
Attacker Tradecraft
Neighborhood Watch
Neighborhood Watch
No items found.
Glitch effect

See Huntress in Action

Book a personalized demo to look at Huntress under the hood, explore the dashboard, and ask questions to our experts.

Book A Demo
Huntress SOC