Huntress Labs

huntress.com

Huntress is a leading provider of advanced threat detection and actionable cybersecurity information that delivers easy to follow remediation steps into your existing ticketing system. IT Departments & MSPs worldwide use Huntress to enable their junior IT staff to confidently address cybersecurity incidents that slip past their preventive security stack. As a result, we discover breaches before they cause downtime, costly cleanup, and damaged reputations.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security, Platform Security, Software Security

CONCENTRIC AI INCLUDED IN NEWLY CREATED DATA SECURITY POSTURE MANAGEMENT CATEGORY IN RECENT GARTNER® HYPE CYCLE™ REPORT

Concentric AI | August 29, 2022

news image

Concentric AI, a leading vendor of intelligent AI-based solutions for autonomous data security posture management, today announced it has been listed as a Sample Vendor in the newly created Data Security Posture Management category in the recently published Gartner Hype Cycle for Data Security, 2022 report.1 Concentric AI also appears in the Data Access Governance and Data Discovery and Management categories in the Gartner Hype Cycle for Data Security, 2022 report.1 According to t...

Read More

Software Security

ON QINGCLOUD MARKETPLACE, AURORA MOBILE LAUNCHED JG VERIFICATION SERVICE

Aurora Mobile | February 21, 2022

news image

Aurora Mobile Limited, a prominent mobile developer service provider in China, said that it had formed a relationship with QingCloud Technologies Corp. ("QingCloud"). As a result, the Company will make its verification service ("JVerification") available on the QingCloud Marketplace, a one-stop trading platform for cloud-based apps and services. JVerification will provide encrypted user registration and login, 2-step security verification, and other multi-factor authenticatio...

Read More

Data Security

5WPR ANNOUNCES DEDICATED CYBERSECURITY PR PRACTICE

5WPR | June 30, 2021

news image

One of the largest independently-owned PR firms in the U.S., 5W Public Relations, proudly announces its creation of a specialty cybersecurity practice. The new specialty division will concentrate on PR services connected to anti-fraud, cybersecurity, privacy, and compliance companies for B2C and B2B categories. As a prominent agency and innovator in the PR space, the cybersecurity specialty team holds broad experience operating in privacy, IT infrastructure, SaaS, blockchain, tele...

Read More

Platform Security,Software Security,Web Security Tools

SKYHIGH SECURITY ANNOUNCES ACHIEVING AMAZON WEB SERVICES SECURITY

Skyhigh Security | December 28, 2022

news image

Skyhigh security, a leading data security solutions provider, recently announced receiving Amazon Web Services (AWS) Security Competency accreditation in the infrastructure security industry. This distinction recognizes Skyhigh Security's extensive technical expertise in AWS and proven success in its ability to assist customers in achieving their cloud security objectives. Achieving AWS Security Competency distinguishes Skyhigh Security as a member of the AWS Partner Network...

Read More
news image

Data Security, Platform Security, Software Security

CONCENTRIC AI INCLUDED IN NEWLY CREATED DATA SECURITY POSTURE MANAGEMENT CATEGORY IN RECENT GARTNER® HYPE CYCLE™ REPORT

Concentric AI | August 29, 2022

Concentric AI, a leading vendor of intelligent AI-based solutions for autonomous data security posture management, today announced it has been listed as a Sample Vendor in the newly created Data Security Posture Management category in the recently published Gartner Hype Cycle for Data Security, 2022 report.1 Concentric AI also appears in the Data Access Governance and Data Discovery and Management categories in the Gartner Hype Cycle for Data Security, 2022 report.1 According to t...

Read More
news image

Software Security

ON QINGCLOUD MARKETPLACE, AURORA MOBILE LAUNCHED JG VERIFICATION SERVICE

Aurora Mobile | February 21, 2022

Aurora Mobile Limited, a prominent mobile developer service provider in China, said that it had formed a relationship with QingCloud Technologies Corp. ("QingCloud"). As a result, the Company will make its verification service ("JVerification") available on the QingCloud Marketplace, a one-stop trading platform for cloud-based apps and services. JVerification will provide encrypted user registration and login, 2-step security verification, and other multi-factor authenticatio...

Read More
news image

Data Security

5WPR ANNOUNCES DEDICATED CYBERSECURITY PR PRACTICE

5WPR | June 30, 2021

One of the largest independently-owned PR firms in the U.S., 5W Public Relations, proudly announces its creation of a specialty cybersecurity practice. The new specialty division will concentrate on PR services connected to anti-fraud, cybersecurity, privacy, and compliance companies for B2C and B2B categories. As a prominent agency and innovator in the PR space, the cybersecurity specialty team holds broad experience operating in privacy, IT infrastructure, SaaS, blockchain, tele...

Read More
news image

Platform Security,Software Security,Web Security Tools

SKYHIGH SECURITY ANNOUNCES ACHIEVING AMAZON WEB SERVICES SECURITY

Skyhigh Security | December 28, 2022

Skyhigh security, a leading data security solutions provider, recently announced receiving Amazon Web Services (AWS) Security Competency accreditation in the infrastructure security industry. This distinction recognizes Skyhigh Security's extensive technical expertise in AWS and proven success in its ability to assist customers in achieving their cloud security objectives. Achieving AWS Security Competency distinguishes Skyhigh Security as a member of the AWS Partner Network...

Read More

Resources

resource image

Data Security, Platform Security, Software Security

Best Practices for Row Level Security in Tableau with Entitlements Tables

Whitepaper

resource image

Data Security, Platform Security

Cyber Security Capabilities

Video

resource image

Data Security, Enterprise Security

Detect Threats Faster​ | Cisco Secure Endpoint

Video

resource image

Data Security

Modernize Your Java Apps

Whitepaper

resource image

Data Security, Platform Security, Software Security

Best Practices for Row Level Security in Tableau with Entitlements Tables

Whitepaper

resource image

Data Security, Platform Security

Cyber Security Capabilities

Video

resource image

Data Security, Enterprise Security

Detect Threats Faster​ | Cisco Secure Endpoint

Video

resource image

Data Security

Modernize Your Java Apps

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us