Glitch effect

Huntress Resource Center

Welcome to your go-to destination for cybersecurity resources and education. Dig in and find a range of materials made to empower users of all levels with the knowledge and tools to defend against evolving cyber threats.

Huntress social logo
Featured |
eBook

Solving the SIEM Problem

eBook
September 3, 2024
Solving the SIEM Problem
Glitch effectBlue ellipse
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effect
Teal gradient Glitch effect
Showing
Showing
of
Showing
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress social logo
On-Demand Webinar

Understanding Endpoint Detection & Response (EDR)

On-Demand Webinar
December 18, 2023

As the cybersecurity industry enters another year full of acronyms, jargon and alphabet soup, we’re pulling the curtain back on one of the tech categories that matters most right now—EDR.

There’s no denying the need to defend your devices from today’s bad actors. But what exactly is endpoint detection and response, and what role does it play in your security practice?

Join members of the Huntress team for a discussion about EDR. Attendees can expect some helpful insights and actionable recommendations around the following:

  • Defining core EDR capabilities and where they fit into your cyberstack
  • Understanding the differences between managed and unmanaged EDR offerings
  • A (brief) look at Huntress Managed EDR and how we help businesses strengthen their defenses

Text Link
Huntress social logo
Success Kit

Incident Response Tabletop-in-a-Box

Success Kit
December 17, 2023
Incident Response Tabletop-in-a-Box Kit

Is your team prepared to respond to a cybersecurity incident?

Test your incident response processes and proficiency with our tabletop-in-a-box. Through scenario gameplay, your team will learn how to react to cyber incidents from both a strategic and technical perspective, clarify roles and responsibilities, and evaluate overall response preparedness.

This bundle provides everything you need to better-prepare your team for disaster, including:

  • Instructions on how to conduct your tabletop exercise
  • Two exercise scenarios for simulated gameplay
  • Incident response planning materials and more

Download today to prepare your team for tomorrow!

Text Link
Huntress social logo
On-Demand Webinar

How to Leverage Communities to Level Up Your Business

On-Demand Webinar
May 4, 2023

Learn from your peers who use online and in-person communities to collaborate, reveal new trends and make lasting connections.

There’s an overwhelming number of strategies available to grow your business. Testing different strategies can be exhausting and often futile. What if you could “hack” the system and identify proven strategies to level up your IT provider business?

The IT provider industry is highly collaborative in sharing best practices to increase knowledge and grow your business with online and in-person communities.

Join us for an interactive, on-demand webinar featuring a panel of three MSP executives who will share how they have leveraged various communities to grow their businesses. You’ll learn to identify the proper channels and connect with other industry professionals.

Cloud 9 Computing, Universal Data, and Stronghold Data will give you an inside look at how they approach and engage with the following communities:  

  • Virtual communities
  • Local communities
  • Events and conferences
  • Peer groups

Text Link
Huntress social logo
On-Demand Webinar

Evolving the Hunt in Australia & New Zealand: The Latest from Huntress

On-Demand Webinar
March 29, 2023

Hackers are constantly evolving. We’ve seen this firsthand in Australia and New Zealand with a number of high profile breaches in recent months.

But not to fear, Huntress’ Threat Hunters and account team is officially in ANZ. Come join us to learn how we’re teaming up with MSPs in the region and making the hackers fight for every inch!

The Huntress team will be discussing:

  • Where we came from: We’re still the Huntress you love, now with boots on the ground, a managed security platform and a team of 24/7 Threat Hunters backing our EDR solution.
  • What we’re up to now: How Huntress’ Managed EDR and Security Awareness Training solutions are key weapons in your fight against hackers; and
  • Where we’re going: What is Huntress’ product roadmap? How will we continue to evolve the hunt for partners in the region? Learn what we’re building now and our vision for the future.
Text Link
Huntress social logo
eBook

The Ultimate Buyer’s Guide to EDR

eBook
March 3, 2023

Picking the right EDR solution just got easier.

In order to combat today’s threats, businesses need endpoint detection and response (EDR). But how do you pick the best solution for your business?

Don’t worry—we got you. Here's a comprehensive guide on how to find the right EDR solution for your business.

Download our guide to learn:

  • How to properly evaluate your EDR needs
  • What capabilities to consider (and avoid) when searching for your ideal solution
  • The differences between managed and unmanaged EDR offerings
Text Link
Huntress social logo
On-Demand Webinar

How to Survive a Nightmare Attack

On-Demand Webinar
July 28, 2022

What would you do if you had a security incident that could ruin your client relationships and your business? It’s a nightmare scenario - and it’s one that a New York-based MSP faced a year ago.

Progressive Computing was one of the victims of the attack on the Kaseya VSA RMM tool on July 2, 2021. Hackers installed ransomware across their entire client base, simultaneously affecting 2,500 endpoints across 80 clients with 200 physical sites in four different time zones.

Watch our webinar to hear from the team at Progressive Computing as they share their story of the last 12 months. It’s not just a story of the technical side of recovery and restoring their systems, it’s also one of fighting through a mass-scale attack and coming out the other side scarred, but wiser and stronger.

Text Link
Huntress social logo
On-Demand Webinar

How to Crush Cybercriminals with Managed Antivirus

On-Demand Webinar
May 20, 2022

Although antivirus tools are nothing new, they may be more essential than ever when it comes to thwarting attacks aimed at SMBs. Leveraging an AV with a managed component gives an extra layer of protection against ever-evolving attacks.

It’s been six months since we launched our Managed Antivirus service in general availability - and what a ride it’s been. Today, tens of thousands of endpoints are now protected by the top-rated Microsoft Defender and the watchful eyes of the Huntress global ThreatOps team.

Watch Kyle Hanslovan and other members of the Huntress team dive into the story of Huntress Managed Antivirus, exploring the types of threats we’ve seen in the wild, the shenanigans that have been thwarted and how IT teams are seeing more value from their Huntress investment by deploying Managed Antivirus.

We’ll cover real-world examples of how Huntress partners have made the switch to Microsoft Defender. Plus, get a sneak peek of what’s next for the platform from Huntress product owners.

Text Link
Huntress social logo
eBook

Managed Detection & Response: The Missing Layer in Your Cybersecurity Stack

eBook
February 1, 2022

Let’s address the elephant in the room: No business is 100% protected against cyberattacks. Instead of waiting around to become the next victim, modern businesses are adding managed detection and response (MDR) capabilities to stay one step ahead of today’s determined cybercriminals. 

MDR is a combination of technology and human expertise that tightly focuses on detecting, analyzing, and responding to the threats that have snuck past preventive tools.

Download our eBook to learn:

  • How managed detection and response works
  • Where MDR fits into your overall security strategy
  • What capabilities to look for in MDR or managed services

Text Link
Huntress social logo
On-Demand Webinar

How Huntress Can Help You Keep Pace with Today's Savvy Threat Actors

On-Demand Webinar
December 8, 2021

You know who really knows their way around cybersecurity? Threat actors.

To stand a chance against them, we as defenders have to expand our security stacks to include tools that go past prevention—because it’s important to be able to seek out threat actors who sneak in and quietly lurk in your environment.

And that’s where Huntress shines.

Watch a product demo to see the power of managed detection and response backed by human threat hunters. We’ll show you how Huntress can help you defend against threats with Managed Antivirus, as well as how our 24/7 human SOC team responds once an active threat is detected.

Specifically, we’ll cover these main features of The Huntress Managed Security Platform:

  • Persistent Foothold detection
  • Ransomware Canaries
  • External Recon
  • Partner Enablement
  • Managed Antivirus
  • 24/7 Global SOC coverage
  • Host Isolation
Text Link
Huntress social logo
On-Demand Webinar

Exploiting Virtual Events: Huntress Discovers Zero-Day Vulnerabilities in Popular Event Management Platforms

On-Demand Webinar
October 20, 2021

Most organizations have spent the past year scrambling to virtualize their events and expand their webinar calendar - and attackers have taken notice. Huntress has discovered zero-day vulnerabilities in multiple virtual event platforms used in the MSP and Fortune 500 communities.

Text Link
Huntress social logo
eBook

Mass Exploitation of On-Prem Exchange Servers | eBook

eBook
March 4, 2021

Microsoft detected multiple zero-day exploits being used to plunder on-premise versions of Microsoft Exchange Server in what they claim are “limited and targeted attacks.” But from our research, the spread is much larger.The Huntress team has checked over 2,000 Exchange servers and found ~400 vulnerable. The scary thing is that the majority of these endpoints have antivirus or EDR solutions installed—meaning the exploits slipped past most preventive security products.

Text Link
Huntress social logo
On-Demand Webinar

hack_it 2020: A Virtual Security Training Event for MSPs

On-Demand Webinar
October 13, 2020

Can you hack_it? Watch the complete hack_it 2020 event on-demand to sharpen your cybersecurity skills and analyze hacker tradecraft with sessions including:

  • Tabletop Exercise: Recovering from Disaster
  • Introduction to Security Analysis and Malicious Behavior
  • Tradecraft Tuesday/Whitehat Wednesday
Text Link
Huntress social logo
Datasheet

How Cybercriminals Use Stealth to Hide in Your Network Datasheet

Datasheet
Text Link
Huntress social logo
Datasheet

Managed Defender for Microsoft Datasheet

Datasheet
Text Link
Huntress social logo
Success Kit

The Persistence Knowledge Kit

Success Kit

Persistence has become a staple in the modern hacker’s playbook. It’s one of today’s more stealthy attacker techniques—and one that defenders often overlook.

But understanding persistence isn’t just for l33t h4x0rs. With the right knowledge, you can learn how to catch hackers who are hiding in plain sight and beat them at their own game.

In our Persistence Knowledge Kit, we’ve curated a collection of resources to help you better understand persistence and why it’s a hacker favorite. Submit the form and instantly gain access to:

  • Easy-to-digest educational materials
  • A library of video content for your viewing pleasure
  • Additional reading and resources to round out your persistence knowledge
Text Link
Healthcare
Healthcare
Security Awareness Training
Security Awareness Training
Threat Detection
Threat Detection
Selling Cybersecurity
Selling Cybersecurity
Ransomware
Ransomware
Phishing
Phishing
Persistence
Persistence
Mastering Cybersecurity
Mastering Cybersecurity
Incident Response
Incident Response
Endpoint Detection and Response
Endpoint Detection and Response
Cyber Hygiene
Cyber Hygiene
Business Email Compromise
Business Email Compromise
Attacker Tradecraft
Attacker Tradecraft
Neighborhood Watch
Neighborhood Watch
No items found.
Glitch effect

See Huntress in Action

Book a personalized demo to look at Huntress under the hood, explore the dashboard, and ask questions to our experts.

Book A Demo
Huntress SOC