Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCase Studies
Greystone Technology

How Do You Sleep at Night?

The Real Value of 24/7 Coverage

Download Case Study
Products Used

Managed EDR

Managed ITDR

Managed Security Awareness Training

For UK-based managed service provider Greystone Technology, Huntress is more than just a product – it’s peace of mind.

New Year’s Eve. Christmas. 3am on a Saturday morning.

There’s never a good time for cybercrime, but one thing is for sure: attackers will find the most inconvenient moment possible to strike. It’s by design.
While leaving your business defenseless is not an option in an increasingly dangerous digital world, neither is rounding up your team to watch over your clients’ systems around the clock.
Instead, it all comes down to tightening up your security stack. Your holidays depend on it.

Learn More About Greystone Technology

Working Overtime

“Security is obviously a big concern for us,” admits Ben McDougall, director of managed services at Greystone, a managed service provider overseeing small- to medium-sized businesses, based in Manchester in the UK. “Being an MSP, we know we’re a prime target for cybercriminals and for ransomware gangs especially. We take it very seriously.”

While the Greystone team had always prioritized sourcing and implementing the highest performing security product line-up, there was, as ever, room for improvement.

“About a year ago, we were reviewing our security internally, as well as the stack that we push out to our customers, and we felt we were lacking, particularly in our 24/7 coverage,” considers McDougall. “There were other products out there that we looked at, but we felt that Huntress bridged the gap between traditional endpoint detection response and a fully managed security operations center (SOC). In terms of the solution and the price point, it was perfect for us and our customers.”

The around-the-clock SOC was a particular draw to Huntress for Greystone.

“We have quite a small team,” McDougall reasons. “We don’t have enough to, say, cover a full 24/7 SOC or serve as a fleet of trained security analysts. In this sense, Huntress feels like an extension of our team. We know we’ve got consistent, expert eyes on both Greystone operations and our clients’ systems.

“Without Huntress, we’d be back to where we were a year or so ago, lacking that constant cover. Cybercriminals never rest, striking on bank holidays, weekends, or the festive season. Having Huntress helps me sleep at night, knowing our clients are protected.”

This never-ending battle for unwavering protection is all too common in the MSP sphere.

“You’ve got to ask yourself: do you have experts on hand at the drop of a hat?” McDougall challenges. “Do you have people that can triage? And, if an incident occurs in the middle of the night, do you have a team that can take instant remediative action or isolate endpoints? A lot of MSPs have these glaring gaps in their security stack. But for us, that’s a gap that Huntress fills.”

Power to the People

The human element is what allowed Huntress to really stand out from the competition for Greystone.

“We considered other security products, all the way up to a fully outsourced security operations team (which can be prohibitively expensive, particularly for the smaller businesses we service), but they didn’t quite cover the full range like Huntress did,” says McDougall. “It had everything – endpoint detection response, managed detection response, and security awareness training too.

“What I like most about Huntress is that the team gives back to the community. For quite a while before we were a partner, I was always seeing Huntress popping up on social media with loads of useful information and security advice. That’s what really led me to the brand: what they give back, as well what they give to us as a partner.”

‍

On the Alert

Almost immediately after installation, Huntress was churning out invaluable intel on Greystone’s clients.

“Straight away, we had a few minor incidents with open ports on customer managed firewalls that Huntress managed to detect and prompt us to shut down,” says McDougall. “The most recent and worrying involved a machine that one of our clients had taken home with them during the pandemic, when everyone had switched to working remotely.

“It should have been retired but they had fired it up to use personally. When it popped back online, Huntress did a scan and picked up a selection of potentially unwanted software on there.

“The incident really highlighted two things for us: one, there was a device being used that should have been sent back to head office and retired; and two, the software could have led to a serious incident, or possibly a breach. Thanks to Huntress, we were able to isolate that endpoint and protect the client.”

It was all the proof McDougall and the team needed: Huntress was an essential tool. With cyber threats never too far away, Greystone needed to stay on top of any suspect activity.

“If we have a new customer, we’ll now deploy Huntress as a matter of course as we’re onboarding,” McDougall explains. “From there, we’ll go back to the client and present them with anything unusual Huntress might have found, no matter how harmless or inconsequential it seems, and remediate right away. We want to know what we’re walking into and for them as a customer in the process of joining, they obviously want to be secure. It catches those early signs of vulnerability.”

And for Greystone’s longer-standing clients? It’s a non-negotiable.

“We run a short trial for a month, free of charge, for existing customers, just to see what it dredges up,” says McDougall. “Then, we have a sit-down with the client to show them the reports. It’s illuminating. As yet, no one has taken a look at those reports and decided they didn’t want Huntress. Everyone has seen how valuable it is and how much they need it.

“A huge part of that comes from the fact that the reports are so concise and easy to understand, no matter your level of expertise. Even our more junior members of staff can read and digest Huntress’ reports and carry out the remediation themselves.”

‍

‍

‍

‍

The reports are so concise and easy to understand, no matter your level of expertise. Even our more junior members of staff can read and digest Huntress’ reports and carry out the remediation themselves.

‍

‍

No Stone Unturned

As the threat landscape diversifies, so does the suite of tools Greystone leverages to protect their clients.

“When we first started using Huntress, it was just the Managed EDR product,” remembers McDougall. “It’s very simple to deploy and complements our remote tooling well. It’s a completely touchless

install. In terms of day-to-day monitoring, there’s very little we need to do. We’re a small team – we don’t have a fleet of cybersecurity experts.”

“External Recon has also been quite eye-opening,” he continues. “I don’t think we realized how powerful that was initially, but it highlights every exposed port that our customers have, any that could lead to a breach or a cyberattack.”

But Managed EDR isn’t the only tool in the kit. Huntress continues to innovate far beyond Managed EDR to meet Greystone’s security needs – and the needs of its clients.

“We use Huntress Managed Security Awareness Training for monthly awareness training, which keeps everybody on their toes and up to speed with security,” says McDougall. “But what’s really been instrumental for us is the Managed Identity Threat Detection and Response solution. At the beginning of our partnership, it was still quite new, an unexpected and beneficial addition that, once again, addressed a gap, protecting even more attack vectors for clients, such as email or identity-based attacks. It’s been so useful for us.”


Team Player

Above all else, this is a partnership – one that McDougall has deep appreciation for.

“The relationship we have with Huntress is second to none,” he praises. “The communications team works so closely with our account manager. It truly feels like a partnership – it’s not just another product in our stack.

“One of the best things about Huntress is that it’s constantly evolving as a partner. The team is always looking at new ways it can assist or improve its offering and that’s what gives me confidence for the future. The team will probably see opportunities to do that before we do.

“Our clients know that Huntress will keep them secure, even when the Greystone offices are closed. Having access to, and working alongside, such professional, highly trained security analysts is critical. It’s not just a script or AI working in the background – it’s real people.”

‍

‍

"The relationship we have with Huntress is second to none. It truly feels like a partnership – it’s not just another product in our stack."


Greystone Technology
Contact
Ben McDougall
Location
Manchester, UK
About

Greystone is a leading provider of comprehensive IT solutions and services, dedicated to helping smaller businesses navigate the complexities of technology in the modern workplace. With a strong focus on customer centricity, innovation and reliability, Greystone offers a wide range of services, including cloud computing, cybersecurity, managed IT services, and bespoke software development.
Founded in 1997, Greystone has established itself as a trusted partner for small businesses across various sectors. Greystone believes in the power of technology to transform businesses. Its mission is to empower its clients with cutting-edge solutions that drive growth, enhance productivity, and secure their digital assets.
With a deep understanding of the latest technology trends and a proactive approach to IT challenges, Greystone is dedicated to ensuring its clients stay ahead of the curve.

Share this Success Story

Download Case Study
Share

Other Case Studies

  • One Click from Catastrophe
    One Click from Catastrophe
    Learn more about Trumbull Tech and Huntress Managed ITDR helped an Accountant avoid financial ruin.
  • Beyond the Tools
    Beyond the Tools
    When hackers set their sights on businesses across the Netherlands, Connectworks had a tough choice—adapt or risk it all. With more than 7,000 endpoints protected by only antivirus tools, they needed Huntress.
  • One Suspicious Login. One Client in Jeopardy. One Expert Team on the Hunt.
    One Suspicious Login. One Client in Jeopardy. One Expert Team on the Hunt.
    Learn how Huntress’ Managed Identity Threat Detection and Response cracked the case for a New Zealand IT service provider.
  • Blue Paladin
    Blue Paladin
    Blue Paladin cut down alert fatigue and quickly tackled a holiday zero-day threat with Huntress. They achieved faster responses, easier investigations, and genuine peace of mind, all without growing their team.
  • It Starts with Onboarding
    It Starts with Onboarding
    Explore How A Healthcare Tech Provider Uses Huntress Managed Security Awareness Training to Launch a Cybersecurity Program That Starts with Onboarding
  • Connecting Point
    Connecting Point
    Connecting Point, an emerging MSP, partnered with Huntress to elevate security, quiet noisy alerts, and get peace of mind with 24/7 expert-led monitoring.
  • Black Swan Cyber Security Solutions
    Black Swan Cyber Security Solutions
    UK Schools Were Once Easy Cyberattack Targets—Until Black Swan Partnered with Huntress
  • You’ve Not Got Mail
    You’ve Not Got Mail
    Explore How Huntress Managed ITDR helped uncover an attempt at business email compromise for a Milwaukee-based IT firm.
  • Solis Security
    Solis Security
    Solis Security partnered with Huntress to turbocharge their offerings, build client trust, and take their business to new heights.

Add Cyber Experts to Your Arsenal

See how the global Huntress SOC can augment your team with 24/7 coverage and unmatched human expertise. Start your free trial today.

Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy