Logo
Sign in
Product Logo
Behavior Change and Security CultureHoxhunt

Hoxhunt transforms security awareness training by triggering relevant training when employees exhibit risky behaviors, strengthening security culture through positive reinforcement.

Vendor

Vendor

Hoxhunt

Company Website

Company Website

675ae4aa679e94507502a0ce_Strengten-security-culture.avif
662b7e620bf3cd49d53c09e9_Detect human risk with data.webp
Product details

Hoxhunt addresses risky employee behaviors head-on by instantly triggering relevant training when an employee takes a risky action, such as sharing sensitive company data or using a USB stick. The platform captures diverse behavior signals from multiple systems, providing full visibility into risky employee behaviors to understand the underlying drivers. This real-time behavioral data reveals insights, enabling organizations to identify problem areas and focus their training efforts effectively. By rewarding vigilance and encouraging competition with internal leaderboards, Hoxhunt builds long-term security habits at scale while minimizing disruption through quick, relevant training. The platform coaches away risky employee behaviors, addressing a wide range of unsafe actions that indicate opportunities to nudge employees toward safer cybersecurity practices.

Features & Benefits

  • Instant Training Triggers
    • Triggers instant, relevant training the moment an employee takes a risky action.
  • Gamified Experiences
    • Encourages participation through quick, gamified experiences.
  • Positive Reinforcement
    • Nudges employees toward safer behaviors through positive reinforcement.
  • Behavioral Data Insights
    • Captures diverse behavior signals from multiple systems to provide full visibility into risky employee behaviors.
  • Problem Area Identification
    • Enables drilling down by department, location, and more to identify problem areas and focus training efforts.
  • Security Culture Strengthening
    • Builds long-term security habits at scale by rewarding vigilance.
  • Minimized Disruption
    • Delivers quick, relevant training to minimize disruption.
  • Coaching Away Risky Behaviors
    • Provides opportunities to nudge employees toward safer cybersecurity behaviors.
    • Sharing sensitive data to personal email
    • Creating automatic forwarding rules
    • Mass download from acontrolled place (e.g. Salesforce, SharePoint)
    • Sharing data to external destinations in an unrestricted manner
    • Sharing data to public destinations in an unrestricted manner
    • Accepting external contact requests in Teams
    • Clicking on a malicious URL
    • Employees using an outdated browser
    • USB-stick usage
    • USB-stick initiated installation
    • Unwanted software detected on employee's device
    • Unwanted software prevented on employee's device
    • Malware detected on employee's device
    • Malware prevented on employee's device
    • File shared with unauthorized domain
    • Externally shared source code
    • File sensitivity downgraded
    • Employee granted access to new permissions (e.g. PII-data)