Strengthening cybersecurity awareness with Hoxhunt
January 13, 2024

Strengthening cybersecurity awareness with Hoxhunt

Nidhi Girdhar | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Hoxhunt

Well in our organization we are using Hoxhunt to ramp up our cybersecurity awareness. As phishing attacks are always lurking around trying to trick us into malicious links & getting our sensitive information away. The main problem we are tackling with Hoxhunt is Human element of cybersecurity because no matter how good It defence systems are Humans can still be the weak link. The scope is pretty broad from top level executives to new hires everyone gets a taste of simulated attacks. It creates these realistic scenarios that mimics the latest phishing attacks.
  • Realistic scenarios
  • personalized training paths
  • engaging content
  • gamified trainings
  • detailed analytics
  • advanced security threat emails for advanced trainings
  • enhanced reporting features
  • more customization options
  • reduced phishing incidents
  • Improved incident response efficiency
  • Enhanced reputation toward market

Do you think Hoxhunt delivers good value for the price?

Yes

Are you happy with Hoxhunt's feature set?

Yes

Did Hoxhunt live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Hoxhunt go as expected?

I wasn't involved with the implementation phase

Would you buy Hoxhunt again?

Yes

1. Limited IT resources - If an organization has limited It resources & struggle to manage additional cybersecurity tools, implementing Hoxhunt might be challenging. It requires some administration & oversight to be effective.
2. Highly technical user base/Where high security risks are there - Hoxhunt training content is too basic against high level of phishing attacks, its more detailed for general audience rather than for the people with high technical expertise.

Hoxhunt Feature Ratings

Training Content Library
10
Multilingual Training Content
9
Training Gamification
10
Industry-Specific Security Training
8
Individualized Security Training Plans
10
Phishing Simulations
8
Security Reporting
10
Integration with Security Tech Stack
10
Role-based user permissions
9
Single sign-on capability
9