“Huntress notified us of the threat before we had any idea what was happening,” said Tom Noon, VP of Operations at Missouri-based MSP, Blue Tree Technology. “Their team gave us all the information we needed to get up to speed, including the machine name that was infected, the steps to confirm the infection, and how to remediate the threat.” In this case, the infected machine was hosted by IntelliData Solutions, a hosting partner of Blue Tree Technology.
“We had VMware servers that were patched, yet hackers were still able to sneak through,” said Pavan Agrawal, CTO at IntelliData Solutions. “Huntress gave us a specific set of instructions that told us how to confirm that there was an infection and how to remediate the threat. We were able to easily follow the instructions to evict the malicious content and confirmed with Huntress once it was complete. We avoided a really messy situation—that’s all thanks to Huntress.”
After following Huntress’ remediation steps, both IntelliData Solutions and Blue Tree Technology successfully restored their data to its pre-infected state by the end of the day. “Huntress helped us be more proactive, rather than reactive,” said Alec Smith, President at IntelliData Solutions. “If we hadn’t confirmed and remediated the threat, client information would have been compromised and we could have suffered severe damage to our reputation.”
Huntress Managed EDR captures threat actor activity by actively monitoring processes in near-real-time. The forensics performed by Managed EDR identifies and alerts administrators to suspicious activity. However, unlike traditional cybersecurity technology which relies on administrators to comb through all the data and alerts, Managed EDR is backed by Huntress’ team of human threat hunters. The Huntress SOC team filters through the alerts for partners to verify threats and send only incident reports that require attention paired with remediation instructions. This eliminates false positives and assures partners that alerts are timely and relevant.
“Artificial intelligence is good, but there is nothing better than the human intelligence of Huntress’ threat hunters,” explains Tom of Blue Tree Technology. “We get so many alerts, noise and false positives from our other cybersecurity tools—it’s hard for our technicians to know what to focus on. Huntress filters out all that noise. Their SOC team does a remarkable job of verifying threats and only sending alerts when they need our attention or action. Our techs know that when an alert from Huntress comes through, they better look at it. This incident was an example of that—and it gave us the validation we needed to roll out Huntress to all our clients.”