Our Huntress Offerings

Managed detection and response plans for Houston businesses, every tier.

Plans for Any Threat Surface

Every Tomotechi Huntress plan bundles agent licensing with the operational work that actually closes the detection-to-response loop — alert triage, incident coordination, M365 onboarding, and ongoing tuning. Three tiers cover the range from endpoint-only coverage to full identity, training, and log analytics.

Pricing varies by endpoint count, M365 user count, and add-ons. Contact us for a quote tailored to your environment.

Endpoint — managed EDR for your devices

Huntress’s flagship product, focused on catching the persistence and post-exploitation activity that traditional antivirus misses. The right starting point for businesses that want to close the EDR gap without overhauling their existing stack.

  • Huntress Managed EDR agent on every endpoint (Windows, macOS, Linux)
  • 24/7 SOC review of every alert — you only hear about confirmed incidents
  • Guided remediation steps from the Huntress SOC for any confirmed threat
  • Alert routing to the Tomotechi help desk with defined escalation tree
  • Compatible with existing AV/EDR (Microsoft Defender, SentinelOne, others) — no rip-and-replace
  • Quarterly threat report covering what was detected and blocked in your environment

Endpoint + Identity — managed EDR plus M365 ITDR Most popular

The configuration that matches where attacks actually land in 2026: split between endpoints and Microsoft 365 identity. Adds Huntress ITDR to catch the cloud-side attacks that endpoint EDR can’t see.

  • Everything in Endpoint
  • Huntress Managed ITDR for Microsoft 365 / Entra ID
  • OAuth app monitoring — suspicious app grants flagged and reviewed
  • Mailbox rule monitoring — the classic BEC indicator caught early
  • Suspicious sign-in detection — impossible-travel, anomalous IP, MFA bypass attempts
  • Account takeover response coordination with the Huntress SOC
  • Conditional Access policy review during onboarding
  • Quarterly identity-side threat report

Full Stack — EDR + ITDR + Awareness Training + SIEM

For organizations that want the complete Huntress story: endpoints, identities, employee training, and managed log analytics in one operational stack. The right tier for high-compliance environments and businesses that have made security a board-level concern.

  • Everything in Endpoint + Identity
  • Huntress Managed Security Awareness Training — phishing simulations and short-form training employees actually finish
  • Huntress Managed SIEM — log aggregation with detection rules curated by Huntress threat researchers
  • Detection rule tuning specific to your industry and applications
  • Annual tabletop exercise with our team and the Huntress SOC
  • Cyber insurance attestation packet — the artifacts your underwriter actually wants to see
  • Monthly executive security report

What’s Included at Every Tier

  • Tomotechi-managed alert flow — you don’t need a security analyst on staff; we are that layer
  • One bill — Huntress licensing rolls into your existing Tomotechi invoice
  • Coordinated incident response — for confirmed incidents, we drive remediation through to closure
  • Houston-local on-site — for incidents requiring physical evidence collection or hands-on isolation
  • Tuning and exclusion management — we work with the SOC to keep alert quality high
  • Quarterly threat reports — what was detected, what was blocked, what to think about going forward

Add-ons and Customization

Engagements that complement the standard tiers:

  • Pre-deployment security assessment — review of your current posture before going live
  • Compromise assessment — if you suspect prior breach, we deploy Huntress and use the initial detection sweep to surface dormant footholds
  • Cyber insurance application support — assemble the security control attestations underwriters require
  • Microsoft 365 hardening engagement — tighten conditional access, MFA enforcement, and sharing policies before turning on ITDR
  • Custom threat hunts — for specific concerns (departed employee data exfiltration, vendor breach exposure, industry-specific TTPs)
  • Tabletop exercises — scenario-based response drills with leadership and IT

Get a Quote for Your Environment

Tell us your endpoint count, M365 user count, current security stack, and any compliance requirements and we’ll come back with a tier recommendation and a price.

Call 281-407-1619 or use the form to start the conversation.

Request a Quote