Welcome to your go-to destination for cybersecurity resources and education. Dig in and find a range of materials made to empower users of all levels with the knowledge and tools to defend against evolving cyber threats.
Solving the SIEM Problem
Understanding Endpoint Detection & Response (EDR)
As the cybersecurity industry enters another year full of acronyms, jargon and alphabet soup, we’re pulling the curtain back on one of the tech categories that matters most right now—EDR.
There’s no denying the need to defend your devices from today’s bad actors. But what exactly is endpoint detection and response, and what role does it play in your security practice?
Join members of the Huntress team for a discussion about EDR. Attendees can expect some helpful insights and actionable recommendations around the following:
Incident Response Tabletop-in-a-Box
Is your team prepared to respond to a cybersecurity incident?
Test your incident response processes and proficiency with our tabletop-in-a-box. Through scenario gameplay, your team will learn how to react to cyber incidents from both a strategic and technical perspective, clarify roles and responsibilities, and evaluate overall response preparedness.
This bundle provides everything you need to better-prepare your team for disaster, including:
Download today to prepare your team for tomorrow!
How to Leverage Communities to Level Up Your Business
Learn from your peers who use online and in-person communities to collaborate, reveal new trends and make lasting connections.
There’s an overwhelming number of strategies available to grow your business. Testing different strategies can be exhausting and often futile. What if you could “hack” the system and identify proven strategies to level up your IT provider business?
The IT provider industry is highly collaborative in sharing best practices to increase knowledge and grow your business with online and in-person communities.
Join us for an interactive, on-demand webinar featuring a panel of three MSP executives who will share how they have leveraged various communities to grow their businesses. You’ll learn to identify the proper channels and connect with other industry professionals.
Cloud 9 Computing, Universal Data, and Stronghold Data will give you an inside look at how they approach and engage with the following communities:
Evolving the Hunt in Australia & New Zealand: The Latest from Huntress
Hackers are constantly evolving. We’ve seen this firsthand in Australia and New Zealand with a number of high profile breaches in recent months.
But not to fear, Huntress’ Threat Hunters and account team is officially in ANZ. Come join us to learn how we’re teaming up with MSPs in the region and making the hackers fight for every inch!
The Huntress team will be discussing:
The Ultimate Buyer’s Guide to EDR
In order to combat today’s threats, businesses need endpoint detection and response (EDR). But how do you pick the best solution for your business?
Don’t worry—we got you. Here's a comprehensive guide on how to find the right EDR solution for your business.
Download our guide to learn:
How to Survive a Nightmare Attack
What would you do if you had a security incident that could ruin your client relationships and your business? It’s a nightmare scenario - and it’s one that a New York-based MSP faced a year ago.
Progressive Computing was one of the victims of the attack on the Kaseya VSA RMM tool on July 2, 2021. Hackers installed ransomware across their entire client base, simultaneously affecting 2,500 endpoints across 80 clients with 200 physical sites in four different time zones.
Watch our webinar to hear from the team at Progressive Computing as they share their story of the last 12 months. It’s not just a story of the technical side of recovery and restoring their systems, it’s also one of fighting through a mass-scale attack and coming out the other side scarred, but wiser and stronger.
How to Crush Cybercriminals with Managed Antivirus
Although antivirus tools are nothing new, they may be more essential than ever when it comes to thwarting attacks aimed at SMBs. Leveraging an AV with a managed component gives an extra layer of protection against ever-evolving attacks.
It’s been six months since we launched our Managed Antivirus service in general availability - and what a ride it’s been. Today, tens of thousands of endpoints are now protected by the top-rated Microsoft Defender and the watchful eyes of the Huntress global ThreatOps team.
Watch Kyle Hanslovan and other members of the Huntress team dive into the story of Huntress Managed Antivirus, exploring the types of threats we’ve seen in the wild, the shenanigans that have been thwarted and how IT teams are seeing more value from their Huntress investment by deploying Managed Antivirus.
We’ll cover real-world examples of how Huntress partners have made the switch to Microsoft Defender. Plus, get a sneak peek of what’s next for the platform from Huntress product owners.
Managed Detection & Response: The Missing Layer in Your Cybersecurity Stack
Let’s address the elephant in the room: No business is 100% protected against cyberattacks. Instead of waiting around to become the next victim, modern businesses are adding managed detection and response (MDR) capabilities to stay one step ahead of today’s determined cybercriminals.
MDR is a combination of technology and human expertise that tightly focuses on detecting, analyzing, and responding to the threats that have snuck past preventive tools.
Download our eBook to learn:
How Huntress Can Help You Keep Pace with Today's Savvy Threat Actors
You know who really knows their way around cybersecurity? Threat actors.
To stand a chance against them, we as defenders have to expand our security stacks to include tools that go past prevention—because it’s important to be able to seek out threat actors who sneak in and quietly lurk in your environment.
And that’s where Huntress shines.
Watch a product demo to see the power of managed detection and response backed by human threat hunters. We’ll show you how Huntress can help you defend against threats with Managed Antivirus, as well as how our 24/7 human SOC team responds once an active threat is detected.
Specifically, we’ll cover these main features of The Huntress Managed Security Platform:
Exploiting Virtual Events: Huntress Discovers Zero-Day Vulnerabilities in Popular Event Management Platforms
Most organizations have spent the past year scrambling to virtualize their events and expand their webinar calendar - and attackers have taken notice. Huntress has discovered zero-day vulnerabilities in multiple virtual event platforms used in the MSP and Fortune 500 communities.
Mass Exploitation of On-Prem Exchange Servers | eBook
Microsoft detected multiple zero-day exploits being used to plunder on-premise versions of Microsoft Exchange Server in what they claim are “limited and targeted attacks.” But from our research, the spread is much larger.The Huntress team has checked over 2,000 Exchange servers and found ~400 vulnerable. The scary thing is that the majority of these endpoints have antivirus or EDR solutions installed—meaning the exploits slipped past most preventive security products.
hack_it 2020: A Virtual Security Training Event for MSPs
Can you hack_it? Watch the complete hack_it 2020 event on-demand to sharpen your cybersecurity skills and analyze hacker tradecraft with sessions including:
How Cybercriminals Use Stealth to Hide in Your Network Datasheet
Managed Defender for Microsoft Datasheet
The Persistence Knowledge Kit
Persistence has become a staple in the modern hacker’s playbook. It’s one of today’s more stealthy attacker techniques—and one that defenders often overlook.
But understanding persistence isn’t just for l33t h4x0rs. With the right knowledge, you can learn how to catch hackers who are hiding in plain sight and beat them at their own game.
In our Persistence Knowledge Kit, we’ve curated a collection of resources to help you better understand persistence and why it’s a hacker favorite. Submit the form and instantly gain access to:
Book a personalized demo to look at Huntress under the hood, explore the dashboard, and ask questions to our experts.
Book A Demo