Cartoon bee with a shield representing cyber security services. Remote Access Open Support Request

Managed ITDR

Powered by Huntress

Managed Identity Threat Detection & Response

Blowfish Technology delivers 24/7 identity protection for North West businesses – powered by Huntress ITDR. We monitor your Microsoft 365 and Google Workspace environments for account takeovers, suspicious logins and identity-based attacks before they cause real damage.

What Huntress ITDR Covers

  • Microsoft 365 identity monitoring
  • Google Workspace protection
  • Account takeover detection
  • Suspicious login & MFA bypass alerts
  • Business email compromise prevention
  • 24/7 human analyst investigation
24/7Identity threat monitoring
M365& Google Workspace coverage
100%Human-led investigation
1Point of contact – Blowfish Technology

The Problem

Your Microsoft 365 Accounts Are a Primary Target

Cloud identity is now the number one attack vector for cybercriminals. Microsoft 365 and Google Workspace accounts hold your email, files, financial data and business communications – making them an extremely valuable target.

Attackers don’t need to compromise an endpoint anymore. A stolen password or a bypassed MFA prompt is all it takes to gain full access to your business data, impersonate your staff and launch attacks on your customers and suppliers.

Traditional security tools don’t monitor cloud identity environments. Huntress ITDR, managed by Blowfish Technology, fills this critical gap – watching your identities around the clock so you don’t have to.

Common Identity-Based Attacks

Account Takeover – Attackers use stolen credentials to log in as your staff, access data and move laterally

Business Email Compromise – Hijacked email accounts used to redirect payments or deceive suppliers and clients

MFA Bypass & Fatigue – Attackers bombard users with MFA prompts until they accidentally approve, or exploit legacy authentication methods

Privilege Escalation – Compromised accounts used to elevate permissions and gain admin access across your entire Microsoft 365 tenancy

How It Works

Huntress ITDR – Under the Hood

Huntress ITDR connects directly to your Microsoft 365 or Google Workspace tenancy – no agents, no hardware, no disruption – and monitors every identity signal around the clock.

1

Agentless Connection

Huntress connects to your Microsoft 365 or Google Workspace environment via API – no software to install, no devices to touch, no disruption to your team. Setup takes minutes.

2

Continuous Identity Monitoring

Huntress monitors every sign-in, permission change, mailbox rule, app consent and admin action across your entire tenancy – building a baseline of normal behaviour and flagging anything that deviates.

3

Human Analyst Investigation

When a suspicious signal is detected, real human analysts at Huntress’s 24/7 SOC investigate – reducing noise and ensuring you’re only alerted when it matters.

4

Threat Containment

Confirmed threats are acted on immediately – compromised accounts locked, sessions terminated, malicious inbox rules removed and admin privileges revoked.

5

Clear Incident Reports

You receive plain-English reports explaining exactly what was detected, what action was taken and what it means for your business – no jargon.

6

Blowfish Manages It All

Blowfish Technology handles setup, ongoing management and escalation – you get full ITDR protection without needing an in-house security team.

Key Features

Everything Included as Standard

?

Account Takeover Detection

Detects impossible travel logins, unfamiliar device access, bulk email forwarding rules and other indicators that a user’s account has been compromised.

?

Business Email Compromise Prevention

Monitors for mailbox rules, forwarding configurations and permission changes attackers use to intercept email, impersonate staff and commit financial fraud.

?

MFA Bypass Detection

Identifies MFA fatigue attacks, legacy authentication attempts and Adversary-in-the-Middle (AiTM) techniques attackers use to circumvent multi-factor authentication.

?️

Privilege Escalation Monitoring

Any attempt to elevate account permissions or assign admin roles is monitored and investigated – preventing attackers from gaining elevated access.

?

Full Tenancy Visibility

Complete visibility across every user, app consent, sign-in event and admin action in your Microsoft 365 or Google Workspace environment.

Rapid Threat Response

When a confirmed threat is identified, Huntress and Blowfish act fast – locking accounts, removing malicious configurations and preventing further access.

Why Blowfish + Huntress

Identity Protection Built for North West SMEs

Most businesses have invested in Microsoft 365 but have no visibility into what’s happening inside it. Huntress ITDR, delivered by Blowfish Technology, gives you that visibility – and the expert response capability to act on it.

Get in Touch

No Agents Required – Connects via API, nothing to install on devices
Microsoft 365 & Google Workspace – Full coverage for the cloud platforms your business relies on
24/7 Human Monitoring – Real analysts watching your identities around the clock
Rapid Deployment – Up and running within hours, not days
Built for SMEs – Enterprise-grade identity protection at an SME price point
Fully Managed by Blowfish – One call handles everything – no vendor juggling
ISO 27001 Accredited – Our security management meets the highest international standards

Frequently Asked Questions

What is Identity Threat Detection and Response (ITDR)?

ITDR is a category of security focused on detecting and responding to attacks that target user identities and cloud platforms. As businesses move to Microsoft 365 and Google Workspace, attackers have shifted focus to identity-based attacks – ITDR is designed specifically to counter these threats.

Does Huntress ITDR require anything to be installed?

No. Huntress ITDR connects via secure API – nothing to install on any device, no disruption to your users. Blowfish Technology handles the entire setup process.

We already have MFA enabled – do we still need ITDR?

Yes. MFA is important but not foolproof. Attackers routinely bypass MFA through fatigue attacks, legacy authentication protocols and Adversary-in-the-Middle techniques. Huntress ITDR monitors for these bypass attempts and many other threats that MFA alone cannot prevent.

What is the difference between ITDR and Managed EDR?

Managed EDR protects your physical devices. ITDR protects your cloud identities – Microsoft 365 and Google Workspace. The two are complementary and together provide comprehensive protection across both endpoints and cloud platforms. Blowfish Technology can provide both.

What happens when a threat is detected?

Huntress’s SOC analysts investigate and take immediate action – locking compromised accounts, removing malicious inbox rules, revoking active sessions. Blowfish Technology will contact you directly to advise on next steps.

How much does Managed ITDR cost?

Priced per user per month. Blowfish Technology provides it as a standalone service or part of a broader security package. Contact us for a tailored quote.

Ready to Protect Your Business Identities?

Talk to Blowfish Technology about deploying Huntress Managed ITDR for your North West business.

Get in Touch
Back to Cyber Security

Join Our Mailing List


    We never share your data, for more information please read our privacy policy.