Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Scaling To Protect the 99%
Published:
June 17, 2022

Scaling To Protect the 99%

By:
Chris Bisnett
Share icon
Glitch effectGlitch effectGlitch effect

In 2015, we founded Huntress to build a solution that was different from the plethora of existing security solutions. We wanted to make a real difference in the industry—but we also knew that as a small startup with limited resources, it would be difficult to compete directly with the largest vendors.

So, we started to look at what businesses those incumbent vendors weren’t serving. While enterprise organizations had all the security tools and gadgets they could possibly need at their fingertips, managed service providers (MSPs) and the small to mid-market businesses (SMBs) they served were woefully overlooked. These SMBs make up 99% of businesses in the US, yet are largely ignored or priced out of the solution. 

This is where we have positioned Huntress to provide the most value. By focusing on the value derived from the security solution and not on all the bells and whistles—and by building a broad set of versatile solutions to many problems—we have had a lot of success serving our partners.

Naturally, this success has led to a lot of adoption of The Huntress Managed Security Platform, which means we have to scale our infrastructure and team to be able to support all of the partners we have today as well as to prepare ourselves to serve the partners we will onboard in the coming years. This is by no means an easy problem to solve, and it’s even harder to execute while ensuring the products we deliver are top-notch security solutions at an affordable cost. All of the large security solution providers we have spoken with would love to provide their products to the SMB, but they haven’t been able to do that at an affordable cost.

It’s no secret that we’ve had some struggles lately to keep up with the amount of data that we’re receiving and processing on a daily basis—and we’re not afraid to admit that. Solving hard problems requires significant effort and a lot of iteration. 

To help frame the sheer size of the problem, I want to present a sneak peek behind the curtains and give some insight into just how much data we’re processing today and how much we expect to process in the future on our journey to protecting more than 2M endpoints in 2022.

Communicating With the Endpoints

Currently, Huntress is protecting 1.5M endpoints across the world. This means that 1.5M computers have the Huntress agent installed, running and communicating with our servers in Amazon AWS. These agents have to talk to our servers to check for updates, fetch their configuration, send us metadata about the applications running and state of the endpoint, and to receive tasking from our ThreatOps analysts and Assisted Remediations. 

We always consider the tradeoffs of faster reaction time, which requires additional data and CPU utilization, versus a slower reaction time that requires less data and CPU utilization. This way, we can balance the security needs with the infrastructure to process the data—but this many endpoints still results in an absolute ton of requests our servers have to handle.

Recently, the average number of requests per minute ranges from 500-700K requests per minute! That’s right—10,000 requests per second, every second of every day. 

Scaling1

This is a screenshot of the request throughput to our servers with a spike to more than 1M requests per minute!

When you’re dealing with that many requests that need to query and update a database, even small mistakes can cause big issues. 

You can see in the screenshot that we ran into an issue that caused us to return errors to agents asking for updates, and the number of requests dipped down into the 400K requests/minute range. When we fixed this issue, all of the agents that had been checking for updates were finally able to make requests, and we suddenly had to process more than 1M requests/minute! Thankfully, we run all of our infrastructure in AWS and were able to add servers within a few minutes to handle the additional requests.

EDR and Process Insights Data

For the last 18 months, we’ve been hard at work integrating and enhancing the endpoint detection and response technology we acquired from Level Effect. In typical Huntress fashion, we started providing our Process Insights capabilities to our partners through an early access program so that we could evaluate and learn how our solution would work in the real world and not just in a lab. We knew there would be a lot of data, and as we started to deploy, we learned there was even more data than we were expecting. In many cases, we found hosts sending back data indicating the same processes running several times each minute. 

We’re continuously making efforts to de-duplicate and aggregate similar processes that run frequently, and we’re still collecting on average 22 billion process creation events in a seven-day period! On your average weekday during North American daytime hours, we add 60,000 process creation events every second.

Processing, storing and querying this volume of data while maintaining a cost structure that makes sense for the 99% comes with some unique challenges. We’re committed to solving them, but doing what other vendors do—throwing a ton of hardware at the problem and passing that cost on to partners—isn’t an option for Huntress. As a result, we have to get creative with how we process and store the data so that we can extract the maximum-security value from it while considering the cost of everything we do.

Scaling2

Our Journey To Protect 2M Endpoints

Hopefully, this peek behind the curtains gives a little more insight into the scale of the problems we’re trying to solve for the community as we do everything we can to bring security to the 99%. Transparency and integrity are core values at Huntress, and that means that we strive to be open and honest about both the good and the bad. 

While we never anticipate issues with our site, these types of things do happen, and they can be frustrating for our partners—and for us. We’re going to continue improving to make sure that we can deliver the best experience and security possible to our partners and the community.

Categories
Huntress News
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • How Huntress Transformed Its Detection Engine

    The blog post discusses the evolution of Huntress' data analysis in response to scaling challenges and how we transitioned to a custom detection engine.
  • New Faces and Features to Help You Evolve the Hunt

    Learn about Huntress’ newest platform and service updates, including Managed Antivirus, Host Isolation and 24/7 ThreatOps coverage.
  • Bug Bounties for the 99%

    Bug bounty programs are everywhere for enterprise organizations. But where does that leave the 99%—those under-resourced small to mid-sized businesses?
  • Distrusting Symantec Issued Certificates

    Read more about security updates to the Huntress platform.
  • How Huntress Can Complement – Not Complicate – Your Security Stack

    Learn why Huntress is built to complement—not complicate—our partners’ daily operations and deliver on our mission to secure the 99%.
  • Putting the Dee(Dee) in Defense: Huntress Acquires Curricula

    We're continuing to deliver on our promise to secure the 99% by acquiring Curricula: a story-based security awareness training platform.
  • An Inside Look at Huntress’ Platform Vision and Mission

    In this blog, we get candid about our view of today’s security space. Plus, we share all the details on how and why we build security products the Huntress way.
  • Unlocking SIEM: The Role of Smart Filtering

    Learn how our Smart Filtering Engine changes the game on how you view log data ingestion and management.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy