{"id":333,"date":"2025-01-22T16:06:44","date_gmt":"2025-01-22T16:06:44","guid":{"rendered":"https:\/\/itwireless.net\/?page_id=333"},"modified":"2025-02-17T12:14:19","modified_gmt":"2025-02-17T12:14:19","slug":"huntress-security","status":"publish","type":"page","link":"https:\/\/itwireless.net\/index.php\/huntress-security\/","title":{"rendered":"Huntress Security"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull\" style=\"padding-top:64px;padding-right:32px;padding-bottom:64px;padding-left:32px;min-height:200px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-ti-bg-inv-background-color has-background-dim-40 has-background-dim\"><\/span><img decoding=\"async\" width=\"1280\" height=\"853\" class=\"wp-block-cover__image-background wp-image-365\" alt=\"Laptop Security\" src=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-life-of-pix-7974.webp\" style=\"object-position:50% 88%\" data-object-fit=\"cover\" data-object-position=\"50% 88%\" srcset=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-life-of-pix-7974.webp 1280w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-life-of-pix-7974-300x200.webp 300w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-life-of-pix-7974-1024x682.webp 1024w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/pexels-life-of-pix-7974-768x512.webp 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group alignwide is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-138c33e9 wp-block-group-is-layout-constrained\" style=\"padding-top:32px;padding-right:32px;padding-bottom:32px;padding-left:32px\"><h1 class=\"has-text-align-center wp-block-post-title\">Huntress Security<\/h1><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-ti-fg-alt-color has-ti-bg-inv-background-color has-text-color has-background is-layout-constrained wp-container-core-group-is-layout-5edc43e1 wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px;padding-top:64px;padding-bottom:64px;background-image:url(&apos;https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/HuntressPageBG.webp&apos;);background-size:cover;\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-normal-font-size\">Hackers are getting smarter-it\u2019s not a matter of just having an antivirus to protect your organisation. They\u2019re finding new ways to avoid detection and breach environments. To stay protected, organisations must be able to determine weaknesses in their infrastructure, detect when there\u2019s a potential breach, and so much more.&nbsp;<\/p>\n\n\n\n<p class=\"has-normal-font-size\">With a powerful blend of purpose-built technology and human expertise, Huntress works with IT providers to monitor for suspicious activity, isolate machines to stop hackers in their tracks, and proactively remediate endpoints to eliminate threats. Using a lightweight agent monitored by a 24\/7 human-led security operation center (SOC) Huntress quickly detects, investigates, and responds when cyber threats arise.<br><br>By partnering with Huntress, we are able to provide enterprise-grade protection for a fraction of the cost. This means you don\u2019t need to stress about cybersecurity because you have a 24\/7 team of experts watching your back.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-ti-accent-background-color has-background is-layout-constrained wp-container-core-group-is-layout-352a731e wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px;padding-top:64px;padding-bottom:64px\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-47e5a185 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group has-ti-bg-background-color has-background is-layout-constrained wp-container-core-group-is-layout-430a0e02 wp-block-group-is-layout-constrained\" style=\"border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:5px;border-bottom-right-radius:5px;min-height:250px;padding-top:32px;padding-right:32px;padding-bottom:32px;padding-left:32px\">\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">Protect<\/h3>\n\n\n\n<p class=\"has-text-align-center\">How cybersecurity can protect your business.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/itwireless.net\/Huntress-What-Is-Cybersecurity.pdf\" target=\"_blank\" rel=\" noreferrer noopener nofollow\">View<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-47e5a185 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group has-ti-bg-background-color has-background is-layout-constrained wp-container-core-group-is-layout-430a0e02 wp-block-group-is-layout-constrained\" style=\"border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:5px;border-bottom-right-radius:5px;min-height:250px;padding-top:32px;padding-right:32px;padding-bottom:32px;padding-left:32px\">\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">Active Threat Hunting<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Managed detection and response against evolving threats.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-b5994976 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"http:\/\/Huntress-Active-Threat-Hunting.pdf\" target=\"_blank\" rel=\" noreferrer noopener nofollow\">View<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-47e5a185 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group has-ti-bg-background-color has-background is-layout-constrained wp-container-core-group-is-layout-430a0e02 wp-block-group-is-layout-constrained\" style=\"border-radius:5px;min-height:250px;padding-top:32px;padding-right:32px;padding-bottom:32px;padding-left:32px\">\n<h3 class=\"wp-block-heading has-text-align-center has-medium-font-size\">Endpoints<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Protect endpoints from being exploited by attackers.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/itwireless.net\/Huntress-Protect-Endpoints.pdf\" target=\"_blank\" rel=\" noreferrer noopener nofollow\">View<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"margin-top:0;margin-bottom:0;padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px;min-height:500px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-ti-bg-inv-background-color has-background-dim\"><\/span><img decoding=\"async\" width=\"1024\" height=\"512\" class=\"wp-block-cover__image-background wp-image-334\" alt=\"Official Partner of Huntress\" src=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/1024x512_Channel_Futures_Announcement_1.png\" style=\"object-position:82% 48%\" data-object-fit=\"cover\" data-object-position=\"82% 48%\" srcset=\"https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/1024x512_Channel_Futures_Announcement_1.png 1024w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/1024x512_Channel_Futures_Announcement_1-300x150.png 300w, https:\/\/itwireless.net\/wp-content\/uploads\/2025\/01\/1024x512_Channel_Futures_Announcement_1-768x384.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are getting smarter-it\u2019s not a matter of just having an antivirus to protect your organisation. They\u2019re finding new ways to avoid detection and breach environments. To stay protected, organisations must be able to determine weaknesses in their infrastructure, detect when there\u2019s a potential breach, and so much more.&nbsp; With a powerful blend of purpose-built [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":517,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-333","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/pages\/333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":0,"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/pages\/333\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/media\/517"}],"wp:attachment":[{"href":"https:\/\/itwireless.net\/index.php\/wp-json\/wp\/v2\/media?parent=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}