SHARE
Facebook X Pinterest WhatsApp

SpecterOps Unveils BloodHound Scentry, Expanding Identity APM

SpecterOps launches BloodHound Scentry, a new service combining BloodHound Enterprise and expert guidance to accelerate identity APM and reduce risk.

Written By
thumbnail
Luis Millares
Luis Millares
Feb 10, 2026
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

SpecterOps, the pioneer behind identity Attack Path Management (APM), has introduced BloodHound Scentry, a new service designed to help customers accelerate their APM practice and reduce identity risk. 

Protecting an organization’s critical assets

According to the company, BloodHound Scentry combines the capabilities of BloodHound Enterprise with the tradecraft of SpecterOps experts to provide tailored guidance for attack path remediation, advanced analysis of emerging threats, and privilege zone design to protect critical assets. 

“The risks associated with identity security continue to grow with each new provider and technology adopted, creating unseen critical risks that can only be resolved through identity APM efforts,” said Robby Winchester, chief services officer at SpecterOps.

“For companies wanting a shortcut to gain identity APM expertise and resources, BloodHound Scentry can accelerate an identity APM program to better identify and protect an organization’s most critical assets,” Winchester added.

Advertisement

SpecterOps promises significant maturity jumps in as little as six months

SpecterOps says that BloodHound Scentry enables organizations with little or no identity APM to build and scale their practice from Level 0 to Level 3 maturity (or higher) in as little as six months, strengthening security posture and reducing risk.

Below are some of Scentry’s key features:

  • Attack Path Remediation: Scentry experts assess your environment, identify priority actions and high‑value targets, and deliver remediation guidance specific to your identity model.
  • Expert Analysis: Monthly analysis of attack paths and trends, sharing of findings and recommended actions, along with investigation of emerging threats when your industry faces elevated risk.
  • Privilege Zone Design: Create privilege zones around your most critical assets. After which, identify and prioritize these assets, configure effective privilege zones, and track ongoing governance and certification.
  • BloodHound OpenGraph Support: BloodHound OpenGraph expands attack path coverage across any platform, repository, or application. Scentry experts help you design and build OpenGraph extensions that meet your coverage needs, including custom applications.
  • Customized Reporting: Tailored reporting that tracks the progress of your identity APM practice, including hygiene reports and quarterly executive packages.
Advertisement

BloodHound Enterprise added to Cisco Marketplace

Alongside the launch of Scentry, SpecterOps recently announced that BloodHound Enterprise will be available through the Cisco SolutionsPlus Marketplace, complementing Cisco’s Identity Intelligence solution with its proactive APM approach.

The partnership gives Cisco Duo customers access to BloodHound Enterprise’s capabilities, which SpecterOps says can help teams surface identity security gaps, such as scenarios where an attacker leverages an overprivileged account to reach a domain controller.

According to the company, Cisco customers who purchase BloodHound can also address risky technical debt across Active Directory and Azure environments.

BloodHound deploys data collectors to gather identity and access telemetry. This data is then analyzed and visualized as graphs within the platform, helping Cisco users identify which assets are most at risk and the steps to eliminate critical attack paths.

thumbnail
Luis Millares

Luis Millares has extensive experience reviewing virtual private networks (VPNs), password managers, and other security software. He has tested and reviewed numerous forms of tech, covering consumer technology like smartphones and laptops, all the way to enterprise software and cybersecurity products. He has authored over 450 online articles on technology and has worked for the leading tech journalism site in the Philippines, YugaTech.com. He currently contributes to the Daily Tech Insider newsletter, providing well-researched insights and coverage of the latest in technology.

Recommended for you...

ThreatDown Study Highlights AI-Driven Ransomware Surge
CyberFox Co-Founders on Recent Investment & 2026 Opportunity
Strategies for Container-Related Incidents Impact Security Goals
Jordan Smith
Jan 29, 2026
CrowdStrike’s Daniel Bernard on Nord Security Partnership
Jordan Smith
Jan 28, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.