Powered by Huntress
Managed Identity Threat Detection & Response
Blowfish Technology delivers 24/7 identity protection for North West businesses – powered by Huntress ITDR. We monitor your Microsoft 365 and Google Workspace environments for account takeovers, suspicious logins and identity-based attacks before they cause real damage.
What Huntress ITDR Covers
- ✓ Microsoft 365 identity monitoring
- ✓ Google Workspace protection
- ✓ Account takeover detection
- ✓ Suspicious login & MFA bypass alerts
- ✓ Business email compromise prevention
- ✓ 24/7 human analyst investigation
The Problem
Your Microsoft 365 Accounts Are a Primary Target
Cloud identity is now the number one attack vector for cybercriminals. Microsoft 365 and Google Workspace accounts hold your email, files, financial data and business communications – making them an extremely valuable target.
Attackers don’t need to compromise an endpoint anymore. A stolen password or a bypassed MFA prompt is all it takes to gain full access to your business data, impersonate your staff and launch attacks on your customers and suppliers.
Traditional security tools don’t monitor cloud identity environments. Huntress ITDR, managed by Blowfish Technology, fills this critical gap – watching your identities around the clock so you don’t have to.
Common Identity-Based Attacks
⚠
⚠
⚠
⚠
How It Works
Huntress ITDR – Under the Hood
Huntress ITDR connects directly to your Microsoft 365 or Google Workspace tenancy – no agents, no hardware, no disruption – and monitors every identity signal around the clock.
Agentless Connection
Huntress connects to your Microsoft 365 or Google Workspace environment via API – no software to install, no devices to touch, no disruption to your team. Setup takes minutes.
Continuous Identity Monitoring
Huntress monitors every sign-in, permission change, mailbox rule, app consent and admin action across your entire tenancy – building a baseline of normal behaviour and flagging anything that deviates.
Human Analyst Investigation
When a suspicious signal is detected, real human analysts at Huntress’s 24/7 SOC investigate – reducing noise and ensuring you’re only alerted when it matters.
Threat Containment
Confirmed threats are acted on immediately – compromised accounts locked, sessions terminated, malicious inbox rules removed and admin privileges revoked.
Clear Incident Reports
You receive plain-English reports explaining exactly what was detected, what action was taken and what it means for your business – no jargon.
Blowfish Manages It All
Blowfish Technology handles setup, ongoing management and escalation – you get full ITDR protection without needing an in-house security team.
Key Features
Everything Included as Standard
Account Takeover Detection
Detects impossible travel logins, unfamiliar device access, bulk email forwarding rules and other indicators that a user’s account has been compromised.
Business Email Compromise Prevention
Monitors for mailbox rules, forwarding configurations and permission changes attackers use to intercept email, impersonate staff and commit financial fraud.
MFA Bypass Detection
Identifies MFA fatigue attacks, legacy authentication attempts and Adversary-in-the-Middle (AiTM) techniques attackers use to circumvent multi-factor authentication.
Privilege Escalation Monitoring
Any attempt to elevate account permissions or assign admin roles is monitored and investigated – preventing attackers from gaining elevated access.
Full Tenancy Visibility
Complete visibility across every user, app consent, sign-in event and admin action in your Microsoft 365 or Google Workspace environment.
Rapid Threat Response
When a confirmed threat is identified, Huntress and Blowfish act fast – locking accounts, removing malicious configurations and preventing further access.
Why Blowfish + Huntress
Identity Protection Built for North West SMEs
Most businesses have invested in Microsoft 365 but have no visibility into what’s happening inside it. Huntress ITDR, delivered by Blowfish Technology, gives you that visibility – and the expert response capability to act on it.
Frequently Asked Questions
What is Identity Threat Detection and Response (ITDR)? ⌄
ITDR is a category of security focused on detecting and responding to attacks that target user identities and cloud platforms. As businesses move to Microsoft 365 and Google Workspace, attackers have shifted focus to identity-based attacks – ITDR is designed specifically to counter these threats.
Does Huntress ITDR require anything to be installed? ⌄
No. Huntress ITDR connects via secure API – nothing to install on any device, no disruption to your users. Blowfish Technology handles the entire setup process.
We already have MFA enabled – do we still need ITDR? ⌄
Yes. MFA is important but not foolproof. Attackers routinely bypass MFA through fatigue attacks, legacy authentication protocols and Adversary-in-the-Middle techniques. Huntress ITDR monitors for these bypass attempts and many other threats that MFA alone cannot prevent.
What is the difference between ITDR and Managed EDR? ⌄
Managed EDR protects your physical devices. ITDR protects your cloud identities – Microsoft 365 and Google Workspace. The two are complementary and together provide comprehensive protection across both endpoints and cloud platforms. Blowfish Technology can provide both.
What happens when a threat is detected? ⌄
Huntress’s SOC analysts investigate and take immediate action – locking compromised accounts, removing malicious inbox rules, revoking active sessions. Blowfish Technology will contact you directly to advise on next steps.
How much does Managed ITDR cost? ⌄
Priced per user per month. Blowfish Technology provides it as a standalone service or part of a broader security package. Contact us for a tailored quote.
Ready to Protect Your Business Identities?
Talk to Blowfish Technology about deploying Huntress Managed ITDR for your North West business.