Likelihood to Recommend If emails are used for confidential communication, Hoxhunt is a HUGE benefit. I have caught myself feeling lax over emailing and clicking links. Hoxhunt makes you really evaluate safety and legitimacy of the emails that are received. We even have laughs about it at staff meetings where staff admit to getting "hoxhunted" and clicking a fake link.
Read full review The application monitors data networks in the organization to generate positive infrastructure for controlling workflows. It enables my team to plan and collaborate from unified data connecting system that provides positive decision-making base. It has basic networking capacity of eliminating bottlenecks that slows workflows. The customer support team provides best technical support and leads for gaining maximum benefits. The cost and licensing terms can favor any business enterprise.
Read full review Pros Training Packages - They cover a wide range of topics that spam emails, social media and physical security such as USB sticks Achievements as incentives - The gaming style of collecting achievements and stars for reporting emails or completing training incentivizes people to engage in a consistent and enthusiastic way. Training Emails - They are able to replicate phishing emails in a realistic way, so it isn't easy to spot straight away meaning we now look at every email with a critical eye which makes us safer. Read full review Immediate recognition of possible conflicting interests within a field of view. Ability to assist users with Research and Development at an extraordinary rate. Real-Time feedback via neural pathways to analyze data and implement independent solutions that are tailored to the specific applications on-site. This entire review was written with the assistance of IRIS technology as a demonstrative of it's very real practical application. This took less than 2 minutes to write using my own hands. Read full review Cons I wish you could report emails without having to open them. It's hard to have access to your dashboard except when you're reporting an email. Would be nice if you kept us informed of other trends in cybercrime in addition email scams. I'd like to learn more about deep fakes and if there's a way to protect oneself... Is there a way to detect those? Read full review Suggestion 1) "RE:View" functionality. Suggestion 2) "ION = EYE-ON" in Language processing. Suggestion 3) Biological GUI+GPU integration. Suggestion 4) Ability to "RE:Quest" IRIS Up-link/Down-link interaction. (Inter-Act w/(EYE-ON)) Read full review Likelihood to Renew Hoxhunt has been great! End users learn quickly and throughout their daily work
Read full review Usability For reasons I have mentioned earlier, the content is engaging (I usually look forward / wait for the next one), it is relevant, it is timely and it is helpful. The other thing is that the tab that is added to Outlook makes reporting of suspicious activity easy. I think this is relevant for most organisations and professionals, in this day and age
Read full review Alternatives Considered Symantec was something I used in my previous company, it had some issues once in a while where I had to re-generate the code for my new ID. I know its for over all protection, but if I didn't have my phone that day, I'd be unable to log in. Hoxhunt helps that way as there is a SSO authentication and needs the fingerprint, I guess it works different for different companies based on their regulations and privacy protection. Haven't really used any other tool like this
Read full review Secure work environment with this platform has enhanced effective workflow infrastructure. The cost of deployment and configuration capabilities with other security applications lead to main decision of acquiring this tool. The security control dashboards gives reliable performance reports that leads to quick decision-making when there are malware attacks. It gives lifecycle report for most work processes and threat intelligence information that enables my team to track workloads effectively.
Read full review Return on Investment Mitigating potential threats allows for a continuous workflow Reducing the incidence of information leakage allows the company to maintain its competitiveness based on its capacity for innovation. It allows our IT security department to detect those users who need better cyber security training. The efforts of our IT engineers are now focused on finding improvements, and not on solving problems derived from the computer infection. Read full review ScreenShots