+
+

Related Products

  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • Blumira
    131 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    374 Ratings
    Visit Website
  • ConnectWise SIEM
    186 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • c/side
    6 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    159 Ratings
    Visit Website
  • Criminal IP
    11 Ratings
    Visit Website
  • Safetica
    358 Ratings
    Visit Website
  • ThreatLocker
    468 Ratings
    Visit Website

About

Hunters, the first autonomous AI-powered next-gen SIEM & threat hunting solution, scales expert threat hunting techniques and finds cyberattacks that bypass existing security solutions. Hunters autonomously cross-correlates events, logs, and static data from every organizational data source and security control telemetry, revealing hidden cyber threats in the modern enterprise, at last. Leverage your existing data to find threats that bypass security controls, on all: cloud, network, endpoints. Hunters synthesizes terabytes of raw organizational data, cohesively analyzing and detecting attacks. Hunt threats at scale. Hunters extracts TTP-based threat signals and cross-correlates them using an AI correlation graph. Hunters’ threat research team continuously streams attack intelligence, enabling Hunters to constantly turn your data into attack knowledge. Respond to findings, not alerts. Hunters provides high fidelity attack detection stories, significantly reducing SOC response times.

About

Take threat hunting and IT security operations to the next level with powerful querying and remote response capabilities. Ransomware file protection, automatic file recovery, and behavioral analysis to stop ransomware and boot record attacks. Deep Learning Technology Artificial intelligence built into Intercept X that detects both known and unknown malware without relying on signatures. Deny attackers by blocking the exploits and techniques used to distribute malware, steal credentials, and escape detection. Elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats. Active adversary mitigation prevents persistence on machines, credential theft protection, and malicious traffic detection.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security professionals searching for an advanced AI-powered SIEM

Audience

IT security professionals

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$28 per user per year
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Hunters
Founded: 2018
Israel
www.hunters.security/

Company Information

Sophos
Founded: 1985
United States
www.sophos.com/en-us/products/endpoint-antivirus.aspx

Alternatives

Alternatives

CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

Azure Marketplace
Blackpoint Cyber
BrightGauge
DataOps.live
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
Jellyfish
OctoXLabs
Panaseer
Pillr
Portnox Security
ScaleOps
Sophos Central Device Encryption
Sophos Cloud Optix
Swimlane
Tines

Integrations

Azure Marketplace
Blackpoint Cyber
BrightGauge
DataOps.live
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
Jellyfish
OctoXLabs
Panaseer
Pillr
Portnox Security
ScaleOps
Sophos Central Device Encryption
Sophos Cloud Optix
Swimlane
Tines
Claim Hunters and update features and information
Claim Hunters and update features and information
Claim Sophos Intercept X Endpoint and update features and information
Claim Sophos Intercept X Endpoint and update features and information