Founded Year

2015

Stage

Series D | Alive

Total Raised

$308.05M

Valuation

$0000 

Last Raised

$150M | 1 yr ago

Revenue

$0000 

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

+5 points in the past 30 days

About Huntress

Huntress is a cybersecurity platform that focuses on protecting endpoints and identities, and providing security awareness training. The company offers endpoint detection and response (EDR), Microsoft 365 identity protection, a security information and event management (SIEM) system, and security awareness training. Huntress primarily serves mid-market enterprises, small businesses, and the service providers that support them. It was founded in 2015 and is based in Ellicott City, Maryland.

Headquarters Location

6996 Columbia Gateway Drive Suite 101

Ellicott City, Maryland, 21043,

United States

833-486-8669

Loading...

ESPs containing Huntress

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTH ➡MARKET STRENGTH ➡LEADERHIGHFLIEROUTPERFORMERCHALLENGER
Enterprise Tech / Cybersecurity

The identity threat detection & response (ITDR) market focuses on safeguarding organizations from unauthorized access, credential theft, and identity-based attacks through advanced detection and response mechanisms. ITDR platforms utilize sophisticated algorithms and behavioral analytics to identify abnormal user activities and potential security breaches in real-time, enabling swift intervention.…

Huntress named as Highflier among 11 other companies, including Silverfort, AuthMind, and BeyondTrust.

Loading...

Research containing Huntress

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Huntress in 1 CB Insights research brief, most recently on Feb 25, 2025.

Expert Collections containing Huntress

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Huntress is included in 2 Expert Collections, including Unicorns- Billion Dollar Startups.

U

Unicorns- Billion Dollar Startups

1,297 items

C

Cybersecurity

11,188 items

These companies protect organizations from digital threats.

Huntress Patents

Huntress has filed 4 patents.

The 3 most popular patent topics include:

  • computer network security
  • computer security
  • linux kernel features
patents chart

Application Date

Grant Date

Title

Related Topics

Status

5/24/2023

6/18/2024

Computer network security, Computer security, Computer networking, Packets (information technology), Linux kernel features

Grant

Application Date

5/24/2023

Grant Date

6/18/2024

Title

Related Topics

Computer network security, Computer security, Computer networking, Packets (information technology), Linux kernel features

Status

Grant

Latest Huntress News

Huntress Simplifies and Accelerates the Path to CMMC Compliance for Defense Contractors

Nov 6, 2025

Purpose-built products and free, assessor-ready documentation make CMMC compliance faster and easier for contractors of all sizes COLUMBIA, Md., Nov. 05, 2025 (GLOBE NEWSWIRE) — Huntress announces enhanced support for contractors looking to achieve Cybersecurity Maturity Model Certification (CMMC) Level 2 compliance. Through a collaboration with leading CMMC consulting firm DEFCERT , Huntress now provides free, assessor-ready documentation to simplify the assessment process. By eliminating the need to create documentation from scratch and pairing it with Huntress’ purpose-built products, contractors can reduce the time, effort, and complexity of preparing for CMMC, accelerating their time to compliance. While CMMC compliance isn’t new, the final rule recently passed by the Department of Defense (DoD) fundamentally changes the verification process for contractors handling Controlled Unclassified Information (CUI). With CMMC Level 2 requirements entering DoD contracts starting November 10, 2025, contractors handling CUI must now prepare for a mandatory assessment by a Certified Third-Party Assessor Organization (C3PAO). This introduces the need for contractors to prove their compliance and prepare for rigorous assessments, which can create operational burdens and delay critical contract awards. “Achieving CMMC compliance is no easy task, but the biggest challenges for contractors are operational and fiscal, not technical,” said Chris Henderson, CISO at Huntress. “The high cost of legacy FEDRAMP solutions has created a significant affordability gap for tens of thousands of subcontractors across the defense industrial base. We’re tackling this challenge head-on by making CMMC-compliant detection and response accessible to contractors of all sizes. Through our partnership with DEFCERT, we also provide customers with free, assessor-ready documentation, dramatically simplifying the compliance process for the areas we support. By offering these tools and resources, we’re making the path to CMMC compliance more accessible, affordable, and efficient.” Huntress supports contractors looking to achieve CMMC compliance in two main ways: Purpose-built products: Huntress enables contractors with CMMC-compliant detection and response backed by a 24/7 AI-assisted Security Operations Center (SOC), directly supporting 37 of the 110 NIST SP 800-171 requirements. Sensitive Data Mode , the key feature that makes the platform CMMC compliant, blocks security analysts from accessing potential CUI files without compromising their ability to effectively detect and remediate threats. Further, Huntress Managed Identity Threat Detection and Response integrates seamlessly with Microsoft 365, including in Government Community Cloud (GCC) High environments. Assessor-ready documentation: In collaboration with DEFCERT, Huntress provides customers with comprehensive, assessor-ready documentation proven to help them pass CMMC Level 2 assessments. This includes a Shared Responsibility Matrix, which outlines the responsibilities of Huntress, the partner, and the end client for meeting specific CMMC objectives, as well as a detailed Operations Plan, which breaks down the individual tasks required for compliance, noting which are one-time or recurring. This saves contractors weeks of planning and days off their assessment by eliminating the need to create documentation from scratch. “The path to CMMC certification is notoriously complex and resource-intensive,” said Ryan Bonner, Founder and CEO at DEFCERT. “We partnered with Huntress to co-develop the assessment-ready documentation that contractors desperately need, speeding up the assessment process and helping them save significant time, money, and resources. This efficiency is vital for the entire ecosystem, as it helps the limited number of C3PAOs process more contractors faster and accelerates the nation’s effort to secure the defense industrial base and achieve CMMC compliance.” Recently, a managed service provider successfully achieved CMMC Level 2 certification with Huntress in scope in just nine hours over two days, receiving a perfect score of 110 on their assessment. This effort was guided by Scott Lumpkin, a CMMC Certified Professional (CCP) and Director of Quantum AI Security, LLC, an MSSP firm located in Orlando, FL, that specializes in the FedRAMP environment. Lumpkin shared, “The Huntress implementation and documentation fully met all CMMC and NIST 800-171 expectations. The fact that the client passed their Level 2 assessment with Huntress in scope, and completed it significantly quicker than the typical assessment timeline, demonstrates that Huntress is an effective and efficient solution for any contractor looking to achieve CMMC Level 2 compliance.” Additional resources: Looking to better understand CMMC? Check out this page for a breakdown of the assessment process, key requirements, and everything you need to know. Read this blog to learn about the assessor-ready documentation, developed by Huntress in partnership with DEFCERT, and how it can streamline your CMMC compliance efforts. Join Huntress and DEFCERT on December 2, 2025, for the webinar “ CMMC is Here: What Does it Mean for You ” and get expert insights into navigating CMMC compliance. About DEFCERT DEFCERT discovers and delivers new ways for the defense industrial base (DIB) and government contractors to meet their contractual and regulatory obligations for data protection. These efforts include compliance with DFARS safeguarding clauses, implementation of NIST special publications, and future assessment under the Cybersecurity Maturity Model Certification (CMMC). DEFCERT primarily works with defense contractors, manufacturers, economic development organizations, managed IT service providers, and technology companies offering solutions to the DIB. You can learn more at www.defcert.com or follow us on LinkedIn . About Huntress Huntress is a global cybersecurity company on a mission to make enterprise-grade products accessible to all businesses. Purpose-built from the ground up, Huntress’ technology is specifically designed to continuously address the unique needs of security and IT teams of all sizes. From Endpoint Detection and Response (EDR) and Identity Threat Detection and Response (ITDR) to Security Information and Event Management (SIEM) tools and Security Awareness Training (SAT), the platform provides targeted protection for endpoints, identities, data, and employees, delivering trusted outcomes and valuable peace of mind. Its 24/7, AI-assisted Security Operations Center (SOC) is powered by a team of world-renowned engineers, researchers, and security analysts, dedicated to stopping cyber threats before they can cause harm. Huntress is often the first to respond to major hacks and incidents, with its expert security team sharing real-time tradecraft analysis and actionable advisories with the community. Currently safeguarding over 4 million endpoints and 8 million identities, Huntress empowers security teams, IT departments, and Managed Service Providers (MSPs) worldwide to protect their businesses with enterprise-grade security accessible to everyone. As long as hackers keep hacking, Huntress keeps hunting. Join the hunt at  www.huntress.com and follow us on X , Instagram , Facebook , and LinkedIn . Huntress Contact:

Huntress Frequently Asked Questions (FAQ)

  • When was Huntress founded?

    Huntress was founded in 2015.

  • Where is Huntress's headquarters?

    Huntress's headquarters is located at 6996 Columbia Gateway Drive, Ellicott City.

  • What is Huntress's latest funding round?

    Huntress's latest funding round is Series D.

  • How much did Huntress raise?

    Huntress raised a total of $308.05M.

  • Who are the investors of Huntress?

    Investors of Huntress include Sapphire Ventures, Meritech Capital Partners, Kleiner Perkins, ForgePoint Capital, JMI Equity and 8 more.

  • Who are Huntress's competitors?

    Competitors of Huntress include UpSight, KnowBe4, Red Canary, ThreatLocker, Bitdefender and 7 more.

Loading...

Compare Huntress to Competitors

T
The VP Techno Labs International

The VP Techno Labs International facilitates cybersecurity solutions. The company offers cybersecurity solutions, using its proprietary Triple Shield DRE methodologies, to protect businesses from cyber threats that could impact their revenue and reputation. The company primarily serves a wide range of sectors including the pharmaceutical, healthcare, hospitality, automotive, and retail industries. It was founded in 2019 and is based in India.

McAfee Logo
McAfee

McAfee operates in the cybersecurity sector, offering services such as antivirus software, identity theft protection, and online privacy solutions. The company provides features including device security, identity monitoring, credit monitoring, and virtual private network services. McAfee was formerly known as Network Associates. It was founded in 1987 and is based in San Jose, California.

Arctic Wolf Logo
Arctic Wolf

Arctic Wolf provides a cloud-native platform to help organizations manage their cyber risk. The company offers services, including detection and response to advanced threats, risk management, cloud security posture management, and incident response. Its services aim to protect against digital risks, harden environments against vulnerabilities, and enable quick recovery from cyber attacks. It was founded in 2012 and is based in Eden Prairie, Minnesota.

eSentire Logo
eSentire

eSentire provides managed detection and response (MDR) services within the cybersecurity domain. The company offers services including threat hunting, incident response, and cyber threat intelligence to protect organizations from cyber threats. eSentire's clientele includes various sectors such as finance, healthcare, and legal industries, which require cybersecurity measures. It was founded in 2001 and is based in Waterloo, Canada.

CyCraft Logo
CyCraft

CyCraft is a cybersecurity company that specializes in automated threat investigation and incident response solutions. The company offers a platform that integrates endpoint detection and response, account attack path analysis, and external attack surface management to provide cybersecurity solutions. CyCraft primarily serves enterprise customers in the financial services industry, high-tech manufacturing, and government agencies. It was founded in 2017 and is based in New Taipei City, Taiwan.

Sophos Logo
Sophos

Sophos provides cybersecurity solutions, including Managed Detection and Response, incident response, endpoint, network, email, and cloud security, aimed at protecting organizations from cyberattacks. The company serves various sectors by offering cybersecurity-as-a-service, security operations platforms, and hybrid solutions that can be managed directly by the organization or supplemented with additional services. It was founded in 1985 and is based in Abingdon, United Kingdom.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.