Akamai Hunt is a managed threat hunting service that searches for and remediates evasive security risks in network environments. The service collects and correlates data from the client's environment and Akamai's platform to identify suspicious activity. It employs machine learning and AI to process data and detect threats, with dedicated experts investigating each event for legitimacy. Akamai Hunt provides real-time alerts with detailed information for insights and mitigation. The Hunt team assists with incident response and works closely with clients to remediate issues. The service integrates with Akamai Guardicore Segmentation and offers features such as context-rich threat intelligence, big data analysis, advanced detection algorithms, and monthly executive-level threat reports.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
Analyze suspicious files, domains, IPs, and URLs to detect malware and other breaches, and share results with the security community.
A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.