Logo
/
Sign in
Product Logo
Behavior Change and Security CultureHoxhunt

Hoxhunt transforms security awareness training by triggering relevant training when employees exhibit risky behaviors, strengthening security culture through positive reinforcement.

675ae4aa679e94507502a0ce_Strengten-security-culture.avif
662b7e620bf3cd49d53c09e9_Detect human risk with data.webp
Product details

Hoxhunt addresses risky employee behaviors head-on by instantly triggering relevant training when an employee takes a risky action, such as sharing sensitive company data or using a USB stick. The platform captures diverse behavior signals from multiple systems, providing full visibility into risky employee behaviors to understand the underlying drivers. This real-time behavioral data reveals insights, enabling organizations to identify problem areas and focus their training efforts effectively. By rewarding vigilance and encouraging competition with internal leaderboards, Hoxhunt builds long-term security habits at scale while minimizing disruption through quick, relevant training. The platform coaches away risky employee behaviors, addressing a wide range of unsafe actions that indicate opportunities to nudge employees toward safer cybersecurity practices.

Features & Benefits

  • Instant Training Triggers
    • Triggers instant, relevant training the moment an employee takes a risky action.
  • Gamified Experiences
    • Encourages participation through quick, gamified experiences.
  • Positive Reinforcement
    • Nudges employees toward safer behaviors through positive reinforcement.
  • Behavioral Data Insights
    • Captures diverse behavior signals from multiple systems to provide full visibility into risky employee behaviors.
  • Problem Area Identification
    • Enables drilling down by department, location, and more to identify problem areas and focus training efforts.
  • Security Culture Strengthening
    • Builds long-term security habits at scale by rewarding vigilance.
  • Minimized Disruption
    • Delivers quick, relevant training to minimize disruption.
  • Coaching Away Risky Behaviors
    • Provides opportunities to nudge employees toward safer cybersecurity behaviors.
    • Sharing sensitive data to personal email
    • Creating automatic forwarding rules
    • Mass download from acontrolled place (e.g. Salesforce, SharePoint)
    • Sharing data to external destinations in an unrestricted manner
    • Sharing data to public destinations in an unrestricted manner
    • Accepting external contact requests in Teams
    • Clicking on a malicious URL
    • Employees using an outdated browser
    • USB-stick usage
    • USB-stick initiated installation
    • Unwanted software detected on employee's device
    • Unwanted software prevented on employee's device
    • Malware detected on employee's device
    • Malware prevented on employee's device
    • File shared with unauthorized domain
    • Externally shared source code
    • File sensitivity downgraded
    • Employee granted access to new permissions (e.g. PII-data)