Tools & TutorialsMEDIUM

Huntress Expands Security Platform with New Tools

🎯

Basically, Huntress created new tools to help businesses protect their computers and user accounts better.

Quick Summary

Huntress has launched new security tools to enhance protection for endpoints and identities. These tools aim to close security gaps and reduce risks for organizations. With automated management, businesses can better defend against cyber threats and maintain a strong security posture.

What Happened

Huntress has unveiled two new tools, Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), as part of its Agentic Security Platform. These additions aim to provide comprehensive protection across endpoints and identities, addressing common security vulnerabilities. The development of Managed ESPM was a significant undertaking, built from scratch, while Managed ISPM was developed in a remarkably short timeframe of less than four months. This rapid development was made possible through insights gained from Huntress's acquisition of Inside Agent in November 2025.

The new tools are designed to empower organizations to proactively identify and remediate security gaps such as misconfigurations and excessive permissions. By leveraging threat intelligence from their AI-driven security operations center, Huntress aims to redefine how businesses manage their security posture without needing extensive expertise or manual oversight.

Who's Affected

The launch of Managed ESPM and ISPM is particularly beneficial for organizations struggling with endpoint management. Research indicates that, on average, one-third of workplace endpoint devices are unmanaged, with many being completely invisible and unsecured. This lack of visibility can lead to significant security risks. Gabe Knuth, a Principal Analyst at Omdia, emphasizes the need for organizations to develop best practices for managing these devices and to have the necessary resources to enforce them consistently.

Huntress's new tools are positioned to help organizations address these challenges. By automating the enforcement of security policies and quickly identifying gaps, they aim to reduce the risk of exploitation by cybercriminals. This is crucial, especially given the reported surge in abuse of remote monitoring and management tools and identity-based threats.

What Data Was Exposed

While the announcement does not specify any data breaches or leaks, the tools are designed to protect against common vulnerabilities that cybercriminals exploit. For instance, Managed ESPM helps control which applications can run on endpoints, blocking unauthorized tools that could lead to security incidents. Additionally, Managed ISPM continuously assesses identity management systems for gaps and rolls back unauthorized changes, thereby enhancing overall security posture.

By addressing these vulnerabilities, Huntress aims to prevent potential data exposure and ensure that organizations maintain a hardened security posture across their environments. This proactive approach is essential as cyber threats continue to evolve and become more sophisticated.

What You Should Do

Organizations looking to enhance their security posture should consider adopting Huntress's new tools. Managed ESPM and ISPM can help close common security gaps and provide a more unified approach to endpoint and identity management. Here are some steps to take:

  • Evaluate Current Security Posture: Assess existing vulnerabilities and identify areas that need improvement.
  • Implement Managed ESPM and ISPM: Leverage these tools to automate policy enforcement and vulnerability management.
  • Monitor Continuously: Use the dashboards and reports provided by Huntress to maintain visibility and compliance.
  • Stay Informed: Keep abreast of the latest threats and best practices in endpoint and identity security to adapt your strategy accordingly.

By taking these steps, organizations can significantly reduce their risk of security incidents and ensure a robust defense against cyber threats.

🔒 Pro insight: The rapid deployment of Managed ESPM and ISPM reflects a growing trend towards automated security posture management in response to increasing endpoint vulnerabilities.

Original article from

Help Net Security · Industry News

Read Full Article

Related Pings

MEDIUMTools & Tutorials

Kingston IronKey - New USB Drive Offers Data Security

Kingston Digital has launched the IronKey Locker+ 50 G2 USB drive. It offers enterprise-grade security with AES 256-bit encryption. This drive is essential for protecting sensitive data against cyber threats.

Help Net Security·
MEDIUMTools & Tutorials

Mobile Security - Combining Automation and Manual Testing

Mobile security is evolving with automation and manual testing. Discover how combining both can enhance vulnerability assessments and protect sensitive data.

TrustedSec Blog·
MEDIUMTools & Tutorials

Microsoft Teams Add-in - Issue Breaks Outlook Classic Functionality

Microsoft is tackling a bug that makes Outlook Classic unusable for some users with the Teams Meeting Add-in enabled. This issue affects email access and functionality. Microsoft is advising users to update or repair their Outlook application while they work on a fix.

BleepingComputer·
MEDIUMTools & Tutorials

Tools - Snyk and Tessl Enhance Agent Skills Security

Snyk and Tessl are enhancing security for agent skills with new scanning technology. Developers can now see security scores for skills in the Tessl Registry. This initiative aims to build trust and protect codebases from vulnerabilities. Stay informed and secure your skills today!

Snyk Blog·
MEDIUMTools & Tutorials

Risk Assessment Frameworks - Key Comparisons Explained

The article compares six essential risk assessment frameworks. These frameworks help organizations manage IT risks effectively. Understanding them is crucial for protecting valuable assets and ensuring compliance.

CSO Online·
LOWTools & Tutorials

ISC Stormcast - Latest Cybersecurity Insights Explained

Tune in to the latest ISC Stormcast for March 17, 2026. This podcast shares valuable insights into current cybersecurity trends and threats. Stay informed and protect yourself with expert analysis.

SANS ISC·