Loading...

Curated attack use case platform that feeds threat scenarios into Jizô AI.
Curated attack use case platform that feeds threat scenarios into Jizô AI.
HOSHI is a use case factory platform developed by Sesame IT, designed to accelerate the detection of advanced cyber threats by supplying ready-made attack use cases to the Jizô AI detection engine. The platform addresses the traditional threat detection workflow — which requires analysts to manually understand new TTPs, convert attacks into network-readable language, create detection rules, inspect flows, and correlate alerts — by reducing that multi-step process to a streamlined two-step approach: identifying a new threat and retrieving its corresponding use case from the HOSHI platform. Key operational concepts: - Use cases are updated daily, providing coverage of emerging and cutting-edge attack techniques. - Operators can browse and select relevant use cases based on their industry and specific risk exposure. - Selected use cases are fed directly into Jizô AI, enriching its detection rules database and enabling near-instant identification of ongoing attacks. - The combination of HOSHI and Jizô AI enables detection from the initial phase of an attack, supporting early-stage threat identification. - The platform claims a 3x improvement in detection speed for advanced threats compared to conventional manual processes. HOSHI is positioned as a companion product to Jizô AI, and its primary function is to serve as a curated, continuously updated library of attack scenarios that operators can deploy into their detection infrastructure without requiring deep manual analysis or rule-writing expertise.
Common questions about Sesame IT HOSHI including features, pricing, alternatives, and user reviews.
Sesame IT HOSHI is Curated attack use case platform that feeds threat scenarios into Jizô AI. developed by Sesame IT (Jizô AI). It is a Threat Management solution designed to help security teams with Detection Rules, Cyber Threat Intelligence, MITRE Attack.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
Get strategic cybersecurity insights in your inbox
Continuous threat intelligence and exposure management across dark, deep & clear web.
SOC Radar Cyber Threat Intelligence is a comprehensive platform that provides dark web monitoring, vulnerability intelligence, and threat actor analysis to help organizations proactively defend against cyber threats.
Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API