The Huntress endpoint agent inventories each application scheduled to automatically start at boot or user login (persistent applications). Metadata on these applications are sent to the Huntress Analysis Engine for inspection. The analysis engine aggregates data from the Huntress agents and uses algorithms to discover malicious outliers (footholds) in the dataset. Each persistent application is evaluated using a combination of file reputation, frequency analysis, and other proprietary algorithms. When an anomaly is detected, Huntress delivers prioritized remediation recommendations—not alerts—to you and all other affected members within the Huntress community. With the Huntress endpoint agent and cloud-based analysis engine, CTS & Huntress experts help protect you and your customers when you’re most vulnerable. As a result, we discover breaches before they cause downtime, costly cleanup, and damaged reputations.

Contact CTS Companies

Name (required)

Email (required)

Phone (required)


voice servces by cts companies
data products by cts companies
cloud services by cts companies