Company Website

Ratings and Reviews 4,474 Ratings

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is Hoxhunt?

Hoxhunt is a platform focused on Human Risk Management that transcends traditional security awareness efforts to foster behavioral transformation and effectively reduce risk levels. By integrating artificial intelligence with behavioral science, Hoxhunt delivers personalized micro-training experiences that users find engaging, enabling employees to better identify and report sophisticated phishing attempts. Security professionals benefit from actionable metrics that demonstrate a significant decrease in human-related cyber risks over time. The platform collaborates with prominent international organizations like Airbus, DocuSign, AES, and Avanade, showcasing its widespread impact in enhancing cybersecurity. With a commitment to ongoing improvement, Hoxhunt continues to evolve its strategies to better equip employees against emerging threats.

What is CybSafe?

CybSafe is a comprehensive software solution that focuses on security awareness and data analytics, assisting organizations in reducing preventable security incidents by evaluating and improving the security practices of their employees. This innovative application enables users to make educated security decisions while providing timely assistance in the ever-changing realms of both personal and professional environments. By highlighting the importance of behavioral security, it incorporates insights from experts in psychology, cyber security, and cybercrime, who engage in extensive research and analysis to offer practical strategies for behavior modification. Additionally, the SebDB resource provides an extensive repository of information on various security behaviors that effectively reduce human-related cyber risks. This database supports CybSafe's distinctive, data-driven methodology for comprehending human behavior regarding cyber risks. By leveraging data, metrics, and in-depth reporting, security practitioners can pinpoint potential vulnerabilities and execute more informed security strategies, ultimately cultivating a stronger security culture within organizations. As a result, by applying these insights, companies can significantly bolster their overall security framework and enhance their defenses against cyber threats. Moreover, this proactive approach not only protects sensitive information but also promotes a security-conscious mindset among employees.

Media

Media

Integrations Supported

Gmail
Microsoft 365

Integrations Supported

Gmail
Microsoft 365

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Hoxhunt

Date Founded

2016

Company Location

Finland

Company Website

www.hoxhunt.com

Company Facts

Organization Name

CybSafe

Company Location

United Kingdom

Company Website

www.cybsafe.com

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Categories and Features

Training

Academic / Education
Asynchronous Learning
Blended Learning
Built-In Course Authoring
Built-in LMS
Certification Management
Corporate / Business
Learner Portal
Mobile Learning
Simulation
Synchronous Learning
Training Companies
eCommerce

Popular Alternatives

Popular Alternatives