Hunters.AI – Assume Detection.

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)Hunters
Company size (employees)10 to 49
Type of solutionCloud/SaaS

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

* Hunters.AI is the only threat hunting-based XDR - It doesn’t only correlate a variety of threat telemetry, logs, events, etc. from different attack surfaces, but it actually encodes threat hunting and platform-based expertise into an autonomous machine that does that. This means Hunters.AI automatically looks for TTPs (Tactics, Techniques, and Procedures), extracts potential attack signals that are often overlooked by security solutions, enriches, investigates, and scores them, and only then correlates them. This results in high fidelity attack stories, and the ability to turn weak signals into strong insights. In addition, the machine behind Hunters.AI is constantly trained and fed with new threat hunting knowledge and attack techniques.
* Best-of-Breed XDR - Owing to its threat hunting-led framework, Hunters.AI doesn’t require a vendor lock-in, but enables a “come as you are” approach to its customers, a capability that has grant it recognition from Gartner (Innovation Insight Report for Extended Detection & Response, March 20). Security operation teams use it to push the envelope on their existing IT technology stacks, and achieve more accurate detection, faster.
* Democratizing threat hunting - built as an autonomous threat hunting solution, Hunters.AI enables companies with limited SOC capabilities to adopt threat hunting as a plug and play. For bigger teams, it enables scale-up, by providing a consolidated hunting platform with a baseline of detectors they can constantly grow and add content to.


Hunters delivers the industry’s first autonomous threat hunting
solution to extend threat detection and response across the
enterprise – a capability increasingly known as ‘XDR.’ Hunters.AI, the
company’s platform, autonomously searches for attack techniques
and detects cyber threats that bypass existing controls, across
surfaces. It ingests raw data and rich security telemetry from a wide
array of data sources and IT environments like cloud, endpoint, and
network, and enriches threat signals with unique tactics, techniques
and procedure-based (TTP) attack intelligence. It then applies ML
and cloud-based analytics to correlate threat patterns, and provide
high fidelity attack stories for rapid cybersecurity team response.

  • Voting

Browse Award Nominations