Hoxhunt transforms security awareness training by triggering relevant training when employees exhibit risky behaviors, strengthening security culture through positive reinforcement.
Vendor
Hoxhunt
Company Website


Hoxhunt addresses risky employee behaviors head-on by instantly triggering relevant training when an employee takes a risky action, such as sharing sensitive company data or using a USB stick. The platform captures diverse behavior signals from multiple systems, providing full visibility into risky employee behaviors to understand the underlying drivers. This real-time behavioral data reveals insights, enabling organizations to identify problem areas and focus their training efforts effectively. By rewarding vigilance and encouraging competition with internal leaderboards, Hoxhunt builds long-term security habits at scale while minimizing disruption through quick, relevant training. The platform coaches away risky employee behaviors, addressing a wide range of unsafe actions that indicate opportunities to nudge employees toward safer cybersecurity practices.
Features & Benefits
- Instant Training Triggers
- Triggers instant, relevant training the moment an employee takes a risky action.
- Gamified Experiences
- Encourages participation through quick, gamified experiences.
- Positive Reinforcement
- Nudges employees toward safer behaviors through positive reinforcement.
- Behavioral Data Insights
- Captures diverse behavior signals from multiple systems to provide full visibility into risky employee behaviors.
- Problem Area Identification
- Enables drilling down by department, location, and more to identify problem areas and focus training efforts.
- Security Culture Strengthening
- Builds long-term security habits at scale by rewarding vigilance.
- Minimized Disruption
- Delivers quick, relevant training to minimize disruption.
- Coaching Away Risky Behaviors
- Provides opportunities to nudge employees toward safer cybersecurity behaviors.
- Sharing sensitive data to personal email
- Creating automatic forwarding rules
- Mass download from acontrolled place (e.g. Salesforce, SharePoint)
- Sharing data to external destinations in an unrestricted manner
- Sharing data to public destinations in an unrestricted manner
- Accepting external contact requests in Teams
- Clicking on a malicious URL
- Employees using an outdated browser
- USB-stick usage
- USB-stick initiated installation
- Unwanted software detected on employee's device
- Unwanted software prevented on employee's device
- Malware detected on employee's device
- Malware prevented on employee's device
- File shared with unauthorized domain
- Externally shared source code
- File sensitivity downgraded
- Employee granted access to new permissions (e.g. PII-data)