Home IT Security Package

Working from your home office? Are your home computers sufficiently protected? Most people are not. Regular anti-virus no longer meets the mark. Criminals are becoming more and more sophisticated, tracking users back to their home offices and personal computers. They then circumvent regular antivirus like Norton or Kaspersky.

The following package of software is designed to address the IT support needs raised by the growing trend in work from home and increasing savvy of the criminal element. It raises your security standards, so you are not the slowest animal in the pack. These products are not available commercially off the shelf.

Huntress EDR and MDR

Typical at home antivirus works like a bouncer with a no entry list. If you are not on the list, you are allowed inside, or in this case, your computer. A hacker can disguise their attack with a random name, and voila, antivirus bypassed. This is where EDR or endpoint detection response comes into the picture. EDR sees past the fake name by analyzing program behavior, then undoing any harmful actions. EDR is a critical component of mitigating zero-day events before the ‘oh no’ moments happen.

MDR stands for managed detection and response. It was designed by former NSA agents to look for persistent footholds and dormant software waiting to be activated. These threats that have made it past the EDR and NDR are then neutralized by Huntress.

Backed by a 24/7 Security Operations Center (SOC), you can count on Huntress to be vigilant in detecting threats waiting to be activated.

DNS Protection

DNS protection is a tool that prevents you unknowingly going to an infected or compromised website. It helps prevent man in the middle redirects from your intended website so you are not tricked to a fake portal. In addition, it can be used to filter out undesired content.

NovaSOC NDR

NDR/SIEM is an abbreviation for network detection response and security information and event management. It identifies vulnerabilities on your machine and detects network anomalies like data exfiltration.