Huntress

Huntress

Managed endpoint detection and response services

About Huntress

Simplify's Rating
Why Huntress is rated
B
Rated B on Competitive Edge
Rated A on Growth Potential
Rated C on Differentiation

Industries

Cybersecurity

Company Size

501-1,000

Company Stage

Series D

Total Funding

$309.8M

Headquarters

Columbia, Maryland

Founded

2015

Overview

Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their main service involves 24/7 monitoring of clients' systems to detect potential cyberattacks. When a threat is identified, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false alarms that can occur with other services. In addition to threat detection, Huntress offers security awareness training and various resources to educate employees about cybersecurity risks. What sets Huntress apart from competitors is their commitment to high customer support and personalized reporting. The goal of Huntress is to enhance the cybersecurity posture of businesses by providing effective monitoring and education.

Simplify Jobs

Simplify's Take

What believers are saying

  • Huntress raised $180M to expand and accelerate product development.
  • The rise in remote work increases demand for Huntress's cybersecurity solutions.
  • Huntress's Managed SIEM makes SIEM technology accessible to all businesses.

What critics are saying

  • Identity-based attacks are rising, posing threats to Huntress's clients.
  • Rogue applications challenge Huntress's ability to protect clients effectively.
  • AI systems' vulnerability to social engineering could compromise Huntress's solutions.

What makes Huntress unique

  • Huntress offers 24/7 threat hunting, reducing false positives for clients.
  • The company integrates with Microsoft 365, enhancing security for Microsoft users.
  • Founded by ex-NSA operators, Huntress brings deep expertise in cybersecurity.

Help us improve and share your feedback! Did you find this helpful?

Funding

Total Funding

$309.8M

Above

Industry Average

Funded Over

6 Rounds

Notable Investors:
Series D funding is typically for companies that are already well-established but need more funding to continue their growth. This round is often used to stabilize the company or prepare for an IPO.
Series D Funding Comparison
Above Average

Industry standards

$77M
$70M
Twilio
$80M
Handshake
$100M
Affirm
$150M
Huntress

Benefits

100% remote work environment

Generous PTO including vacation, sick time, and paid holidays

12 weeks paid parental leave

Highly competitive and comprehensive medical, dental, and vision benefits plans

401(k) with 5% contribution regardless of employee contribution

Life and Disability insurance plans

Stock options for all full-time employees

One-time $500 stipend to build/upgrade home office

Annual allowance for education and professional development assistance

$75 USD/month digital reimbursement

Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth

Growth & Insights and Company News

Headcount

6 month growth

2%

1 year growth

4%

2 year growth

0%
Huntress
Apr 29th, 2025
Minutes Matter: Huntress Managed SIEM Makes Them Count (Here's How)

Late last year, Huntress Labs Incorporated announced Early Availability of Huntress Managed SIEM, which was designed to make SIEM accessible to all businesses.

GlobeNewswire
Apr 28th, 2025
Huntress Empowers Businesses To Take Control Of Their Identity Security With Enhanced Managed Identity Threat Detection & Response Solution

COLUMBIA, Md. and SAN FRANCISCO, CA, April 28, 2025 (GLOBE NEWSWIRE) -- Today, at the RSA Conference, Huntress unveiled its newly enhanced Managed Identity Threat Detection and Response (ITDR) solution, purpose-built to wreck hacker identity tradecraft, alongside new research on the growing threat of identity-based attacks and organizations' ability to defend against them.Drawing insights from an independent UserEvidence survey of more than 600 IT and security professionals, the Huntress 2025 Managed ITDR Report: Identity Is the New Security Perimeter reveals key trends highlighting the growing frequency, severity, and cost of identity-based attacks:Identity-based attacks are rising. A staggering 67% of organizations reported an increase in identity-based incidents over the past three years, with these attacks comprising more than 40% of security incidents for more than a third (35%) of organizations in the past year alone.A staggering 67% of organizations reported an increase in identity-based incidents over the past three years, with these attacks comprising more than 40% of security incidents for more than a third (35%) of organizations in the past year alone. Rogue applications are a top concern. Nearly half (45%) of respondents encountered rogue and/or malicious applications in the past year, and 46% cited them as a top identity-based concern.Nearly half (45%) of respondents encountered rogue and/or malicious applications in the past year, and 46% cited them as a top identity-based concern. Detection and response times are lagging

Huntress
Feb 26th, 2025
Navigating CMMC Compliance in 2025: How Huntress Helps

Tl;dr: To support CMMC compliance, Huntress released a new Sensitive Data Mode, which blocks SOC access to potential CUI files, without compromising analysts' ability to effectively detect and remediate threats.

PYMNTS
Dec 11th, 2024
Business Infrastructure Under Siege As Cybercriminals Target Data Transfer Points

The cornerstones of modern businesses are under attack. With the news Monday (Dec. 9) that cybercriminals, alleged to be from the ransomware group Termite, are exploiting a security flaw that affects ​​Cleo’s LexiCom, VLTransfer and Harmony enterprise file transfer tools, securing critical business infrastructure that handles sensitive data has become an urgent need. Enterprise file transfer tools are designed to securely and efficiently transfer large volumes of data across systems, networks and organizations. These tools are essential for businesses that handle sensitive information or need to comply with regulatory requirements

PYMNTS
Dec 3rd, 2024
Social Engineering Game Exposes Ai’S Achilles’ Heel, Experts Say

A user needed just a few carefully crafted sentences to override an artificial intelligence system’s core directives, manipulating it into transferring $47,000 in cryptocurrency through social engineering and demonstrating how vulnerable AI’s decision-making remains to human psychological tactics.The recent solution of Freysa, an AI game bot explicitly programmed to never transfer funds, reveals how autonomous systems can be tricked through social engineering despite clear instructions.“This wasn’t simply an error within a financial application or a security vulnerability, but rather a crypto game that people would play to try and trick the AI application,” Seth Geftic, Vice President of Product Marketing at Huntress, a cybersecurity company, told PYMNTS. “Funnily enough, the strategy that the person used to finally ‘break through’ the model’s logic was fairly simple: asking it to ignore all previous instructions.”User’s Winning MovesFreysa was an AI agent holding $50,000 in crypto that was programmed never to transfer the funds. Users could pay a fee to try convincing it to break this rule, with one eventually succeeding after 482 attempts.According to an X post by developer Jarrod Watts, the winning user used a three-part strategy: establishing a new “admin session” to override previous rules, redefining the transfer function as meant for receiving rather than sending funds, and finally announcing a fake $100 contribution that triggered the release of the entire prize pool of 13.19 ETH.Watts called the project “one of the coolest projects we’ve seen in crypto.” It was designed as an open challenge in which participants could pay escalating fees to try to convince the AI to break its core directive.Geftic explained that the Freysa AI hack, while dramatic, exploited a known weakness that major AI systems already defend against. Production AI used in finance and healthcare incorporates safeguards that would have blocked such social engineering attempts.“With that in mind, this particular event does not teach us anything new but rather demonstrates how vital it is to follow the best cybersecurity practices, maintain systems at their most recent patches, and be aware of development related to software (AI or not) that a company uses,” he added.Preventing AI HacksWhile AI can handle most financial transactions effectively, its vulnerabilities to evolving cyber threats mean it shouldn’t operate alone, Geftic said. The optimal security approach combines automated AI systems for routine operations with human oversight of critical decisions and transactions.“For any interaction that poses a security risk (making a withdrawal or another transaction that has financial implications), the AI system can escalate the request to a human agent,” he added. “This system is already used within customer service chatbots with high success rates

Recently Posted Jobs

Sign up to get curated job recommendations

Reseller Sales Manager

Full-Time

$225k - $240k/yr

Palmyra, VA, USA

Senior Hunt & Response Analyst

Full-Time

$145k - $165k/yr

Remote in USA

Account Executive I - Service Provider

Full-Time

$60k - $120k/yr

Remote in USA

See All Jobs

Huntress is Hiring for 21 Jobs on Simplify!

Find jobs on Simplify and start your career today

💡
We update Huntress's jobs every few hours, so check again soon! Browse all jobs →

People Also Viewed

Discover companies similar to Huntress

Blackpoint Cyber

Blackpoint Cyber

Ellicott City, Maryland

Deepwatch

Deepwatch

Denver, Colorado

Red Canary

Red Canary

Denver, Colorado

Senior Hunt & Response Analyst

Full-Time

$145k - $165k/yr

Remote in USA

Account Executive I - Service Provider

Full-Time

$60k - $120k/yr

Remote in USA

See All Jobs

Huntress is Hiring for 21 Jobs on Simplify!

Find jobs on Simplify and start your career today

💡
We update Huntress's jobs every few hours, so check again soon! Browse all jobs →

People Also Viewed

Discover companies similar to Huntress

Blackpoint Cyber

Blackpoint Cyber

Ellicott City, Maryland

Deepwatch

Deepwatch

Denver, Colorado

Red Canary

Red Canary

Denver, Colorado