Logo
Sign in

Akamai Hunt is a managed threat hunting service that detects and remediates the most evasive security risks in an organization's environment. It leverages the infrastructure of Akamai Guardicore Segmentation and Akamai's global threat intelligence to proactively hunt for threats across critical environments, from on-premises data centers to cloud platforms. The service combines rich telemetry from the customer's environment with Akamai's global threat data to identify suspicious activities that other tools may miss. Akamai Hunt is led by security experts who investigate detections, provide ...

Vendor

Vendor

Akamai Technologies

Company Website

Company Website

Product details

Akamai Hunt is a premium security service designed to detect and remediate the most evasive threats and risks in an organization's network environment. It capitalizes on the infrastructure of Akamai Guardicore Segmentation and Akamai's extensive global threat intelligence to provide comprehensive threat hunting capabilities. The service combines advanced machine learning techniques, big data analysis, and expert human investigation to identify anomalous behaviors and potential security risks that may evade traditional security tools. Akamai Hunt operates as a seamless extension of an organization's security team, providing always-on threat hunting without additional overhead. It can be activated immediately after deploying Akamai Guardicore Segmentation agents, offering instant value and protection. The service covers critical environments across on-premises data centers, cloud platforms, and even Kubernetes clusters.

Key Features

Unique Dataset Combines rich telemetry from the customer's environment with Akamai's global threat intelligence

  • Correlates local data from segmentation deployments with global threat data
  • Leverages Akamai's DNS sensors for malicious DNS, IPs, and URLs

Advanced Threat Detection Utilizes sophisticated analysis techniques to identify evasive threats

  • Employs graph neural networks to detect anomalous network connections
  • Uses TF-IDF analysis to identify suspicious process spreading

Expert Investigation Dedicated security experts analyze and validate potential threats

  • Eliminates false positives to focus on high-priority security risks
  • Provides detailed alerts with actionable information

Benefits

Enhanced Security Posture Proactively identifies and mitigates advanced threats

  • Detects evasive threats that bypass traditional security controls
  • Reduces the risk of data breaches and lateral movement attacks

Accelerated Time to Value Delivers immediate protection without extensive setup

  • Activates instantly after agent deployment
  • Requires no additional agents or architecture changes

Seamless Integration Operates as an extension of the existing security team

  • Minimizes alert fatigue and operational overhead
  • Provides guided mitigation assistance for faster incident response
Find more products by segment
EnterpriseB2BView all
Find more products by category
Security SoftwareView all