Akamai Hunt is a managed threat hunting service that searches for and remediates evasive security risks in network environments. The service collects and correlates data from the client's environment and Akamai's platform to identify suspicious activity. It employs machine learning and AI to process data and detect threats, with dedicated experts investigating each event for legitimacy. Akamai Hunt provides real-time alerts with detailed information for insights and mitigation. The Hunt team assists with incident response and works closely with clients to remediate issues. The service integrates with Akamai Guardicore Segmentation and offers features such as context-rich threat intelligence, big data analysis, advanced detection algorithms, and monthly executive-level threat reports.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CRITs is an open source malware and threat repository for collaborative threat defense and analysis.
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.
The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.