Huntress Expands Security Offerings with New Product Launches Amid Rising Cyber Threats
In a proactive move to bolster cybersecurity defenses, Huntress, a prominent cybersecurity firm, has introduced two innovative products: Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM). This strategic shift aims to help businesses identify and mitigate security vulnerabilities before they can be exploited by malicious actors, marking a significant departure from the conventional reactive model commonly observed in the cybersecurity industry.
The launch of these new products signals a pivotal moment for Huntress as it seeks to address persistent challenges facing enterprise security. According to security experts, one of the most critical issues in this realm is the prevalence of misconfigured systems, which often remain vulnerable to attacks without detection until they are exploited. By focusing on fortifying these weak points, Huntress aims to enhance overall security posture among its clientele.
This launch is part of Huntress’s aggressive growth strategy, which gained momentum following its acquisition of the identity security startup Inside Agent in November 2025. This acquisition brought specialized knowledge in Microsoft 365 and Entra ID hardening to Huntress, significantly accelerating product development timelines. Impressively, the Managed ISPM was developed in under four months, leveraging the expertise and resources of Inside Agent. Meanwhile, the Managed ESPM was built concurrently from the ground up. This rapid pace of innovation underscores the importance of posture management within Huntress’s broader strategy.
The timing of this product release is particularly crucial, as recent research conducted by Huntress highlights a concerning trend in cybersecurity threats. Notably, there has been a staggering 277% increase in the abuse of remote monitoring and management tools on a year-over-year basis. Additionally, nearly 30% of identity-related threats involve tactics such as mailbox manipulation or OAuth abuse—precisely the vulnerabilities that the new products are designed to address. The growing reliance of ransomware groups and financially motivated attackers on these overlooked attack vectors reflects a troubling shift in the cybersecurity landscape.
Gabe Knuth, a Principal Analyst at Omdia, emphasized the pervasive issue of inadequate visibility in security postures across organizations. He noted that many businesses lack a comprehensive understanding of their security landscape, particularly concerning endpoints. Statistics reveal that, on average, a staggering one-third of workplace devices remain unmanaged, with over half of these devices completely invisible to security teams. This creates substantial blind spots that cyber adversaries are eager to exploit.
The Managed ESPM product is engineered to empower IT teams by offering them enhanced control over the applications that can operate across endpoints. This capability enables organizations to block unauthorized remote-access tools—an increasingly popular attack vector—and enforce strict configuration standards. Furthermore, it aids in prioritizing vulnerability patching through seamless integration with Microsoft Defender for Endpoint. The inclusion of a compliance reporting dashboard represents another vital feature, as Huntress claims it can drastically reduce attestation time from days to mere minutes, proving highly advantageous for companies navigating regulatory frameworks such as the Cybersecurity Maturity Model Certification (CMMC) or the Center for Internet Security (CIS) benchmarks.
On the identity management front, the Managed ISPM product establishes security policies tailored for Microsoft 365 environments. By utilizing a blend of Microsoft’s guidance and industry best practices, the product continuously audits Entra ID and Conditional Access configurations for potential security gaps. In the event of an unauthorized change—often a tactic used by attackers to assert persistence following a successful breach—the Managed ISPM can swiftly roll back the modification within minutes, thereby neutralizing the threat before it can be exploited.
What differentiates both products from traditional posture management tools, according to Huntress, is their operational approach. Legacy solutions in this space typically generate extensive lists of findings, leaving clients to sift through and prioritize remediation themselves—an endeavor that demands significant cybersecurity expertise. In contrast, Huntress’s model allows its security operations center to absorb much of the operational burden. The firm’s analysts actively define, deploy, and maintain security controls on behalf of clients, drawing upon threat intelligence gathered from over four million protected endpoints and ten million identities.
Prakash Ramamurthy, Chief Product Officer at Huntress, characterized the launch as a landmark expansion of the company’s portfolio. He stated, “We see attackers exploiting the same security gaps over and over again. We built Managed ESPM and Managed ISPM to close those gaps before attackers can exploit them.” Ramamurthy highlighted that customers are now equipped with a comprehensive security platform capable of not only preventing unauthorized access but also providing industry-leading threat detection and response mechanisms when adversaries breach initial defenses.
Early evaluations of the new tools have been optimistic. Tzvi Shoop, a cybersecurity consultant at managed service provider Digacore, noted that participating in the product’s alpha testing was “transformational” for his team, as Huntress took on the continuous work of maintaining client environments in a hardened state. He also mentioned the company’s transparency throughout the testing process as a key distinguishing factor.
Currently, both Managed ESPM and Managed ISPM are available through an early access program, with general availability anticipated by summer 2026. Huntress plans to showcase these cutting-edge tools at the upcoming RSA Conference at booth S-3301, signaling its commitment to staying at the forefront of cybersecurity innovation as the landscape continues to evolve.

