Resources
- All
- Featured
- Datasheets
- Podcasts
- Reports
- Videos
- Webinars
Featured
Gartner: SOC Model Guide
Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model can lead to a poor security posture, increased risk, and overexerted security teams. Security and risk management leaders should use this guide to identify which model aligns to their needs.
Open XDR in the Modern SOC
In a world of legacy security tools that are not scaled to handle the breadth of the growing attack surface; point solutions that leave blind spots and limit incident investigation and response; and tools like SIEMs that require massive knowledge and effort to support SOC Threat Detection and Response programs, Open XDR solutions have emerged to revolutionize the way the SOC detects, investigates and responds to threats across the attack surface.
Presented by Hadas Ofir, Head of Customer Success at Hunters, and Yael Macias, Product Marketing Manager at Hunters.
The Security Benefits of Integrating Identity with Detection & Response
Identity plays a central role in cyber attacks, and it offers a window of opportunity for organizations to detect and respond to security incidents in a timely manner. But finding attacks based on authentication data is hard: it requires knowledge, context, the ability to link authentication data to insight from other security and IT tools, and the ability to sort through mountains of false alerts. Extended Detection and Response - XDR - is an emerging security capability that was developed to connect data from multiple sources and apply out-of-the-box detection and response modules to help security teams effectively identify and stop attacks.
Presented by Hunters' CMO Lital Asher at Okta's annual conference, Oktane21.
Reports
Gartner: SOC Model Guide
Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model can lead to a poor security posture, increased risk, and overexerted security teams. Security and risk management leaders should use this guide to identify which model aligns to their needs.
Whitepaper: Knowledge Graphs – The Secret of Google and now XDR
Knowledge Graph – the same technology that powers Google Search – is a structured representation of knowledge, architected for flexibility and compatibility with scalable analytical algorithms. It provides Hunters the ability to investigate, contextualize and correlate security events from across the attack surface in an unprecedented way.
The Impact of XDR in the Modern SOC – an ESG Report
ESG‘s survey research: “The Impact of XDR in the Modern SOC” is out, and one thing looks clear: XDR has become the catalyst for redefining security operations by making them more accurate and agile. Download your complimentary copy of the e-book to learn new findings.
The Importance of Threat Hunting Automation for XDR
In 2020, Hunters and Cybersecurity Insiders conducted in-depth research on threat hunting in SOC detection and response to gain deeper insights into the evolution of the XDR security practice, and how the two are linked.
Datasheets
Hunters SOC Platform Datasheet
Hunters’ SOC platform enables security teams to scale. Offloading the majority of the challenging and manual work security teams have been stuck on, Hunters XDR delivers security results that analysts of any tier can consume to accelerate risk mitigation.
Moving Beyond SIEM with Hunters and Snowflake
Hunters redefines threat detection, investigation and response across the enterprise. Coupled with Snowflake’s data lake, it transforms how organizations monitor, store and analyze petabytes of data they generate across environments, setting a new standard for detection and response.
Identity-Driven Data for Better Detection and Response - Hunters & Okta
Hunters XDR applies deep security knowledge to drive effective detection and response across all organizational environments. Using Okta’s API, Hunters XDR seamlessly ingests Okta logs and telemetry as a key knowledge source for detecting suspicious behaviors, mapping sparse identities into actual users, and enriching and adding context to the automatic investigations performed by the solution.
Extend Threat Detection into New Surfaces with Hunters & CrowdStrike
Hunters’ open XDR extends threat detection beyond the endpoint into cloud, network, identity providers, and more. Cloud-delivered, Hunters seamlessly ingests rich endpoint telemetry from the Falcon platform as well as organizational data and security telemetry from any existing data source in the organization.
Webinars On-Demand
How to Replace Your SIEM Using XDR and a Security Data Lake
Using Hunters XDR, NETGEAR has gained clarity into incidents using automatic investigations of alerts and threat signals, with advanced correlations across attack surfaces, delivering the essential context the SOC needs to act on legitimate threats.
Insights from Pallavi Damle, Senior Director of Global Cybersecurity at NETGEAR
The Journey Beyond SIEM | Forrester, Snowflake & Hunters
Guest speakers, Forrester Analyst Allie Mellen, and Snowflake's Head of Cyber Security Strategy Omer Singer, joined Hunters' CMO Lital Asher, for a live webinar to share key considerations for SIEM replacement.
Not All Clouds Have a Silver Lining: A Cloud Security Webinar
Tune in to watch a reproduction of the latest AWS attack technique that was discovered by Hunters’ Research team, a technique that allows attackers to obfuscate their use of stolen credentials in AWS. You will also learn about Hunters’ AWS research approach, with key analytics and tips & tricks for AWS that you can implement TODAY.
Presented by Eliav Livneh, Senior Security Researcher at Hunters
Hunters & CrowdStrike: Extending Detection, Investigation and Response Across the Attack Surface
Hunters Open XDR seamlessly ingests rich endpoint telemetry from CrowdStrike’s Security Cloud as well as organizational data and security telemetry from any existing data source in the organization, to transform security operations’ ability to detect, investigate and respond to threats across the attack surface, helping the SOC adapt at the pace and scale of the organization.
Presented by Chris Kachigian, Senior Director, Global Solution Architecture Technology Alliances at CrowdStrike, and Andrew Bryan, Head of Security Engineering at Hunters
Open XDR in the Modern SOC
In a world of legacy security tools that are not scaled to handle the breadth of the growing attack surface; point solutions that leave blind spots and limit incident investigation and response; and tools like SIEMs that require massive knowledge and effort to support SOC Threat Detection and Response programs, Open XDR solutions have emerged to revolutionize the way the SOC detects, investigates and responds to threats across the attack surface.
Presented by Hadas Ofir, Head of Customer Success at Hunters, and Yael Macias, Product Marketing Manager at Hunters.
The Security Benefits of Integrating Identity with Detection & Response
Identity plays a central role in cyber attacks, and it offers a window of opportunity for organizations to detect and respond to security incidents in a timely manner. But finding attacks based on authentication data is hard: it requires knowledge, context, the ability to link authentication data to insight from other security and IT tools, and the ability to sort through mountains of false alerts. Extended Detection and Response - XDR - is an emerging security capability that was developed to connect data from multiple sources and apply out-of-the-box detection and response modules to help security teams effectively identify and stop attacks.
Presented by Hunters' CMO Lital Asher at Okta's annual conference, Oktane21.
Moving Beyond SIEM with Hunters and Snowflake
Open XDR redefines how organizations detect and respond to threats across the enterprise. When combined with a modern data lake like the one provided by Snowflake’s Data Cloud, it provides intelligent out-of-the-box analysis that can quickly analyze large volumes of log data, minimize data retention costs, and consolidate formerly siloed security data sources.
Presented by Omer Singer, Head of Cybersecurity Strategy at Snowflake, and Mike Persechini, VP Sales at Hunters.
The Power of Knowledge Graphs: How Hunters Became Google for Threat Detection and Response
Learn how to take your SOC through an evolutionary leap. In this webinar, Hunters’ CEO and Co-Founder Uri May, and Sounil Yu, CISO in Residence, YL Ventures will discuss: how Graph technology transforms sparse threat signals from siloed security tools into actionable attack stories, how SOC teams increase the effectiveness of their threat detection programs with out of the box detection models and approaches for augmenting or replacing SIEM technology with a scaled modern approach, at a better cost.
Presented by Uri May, Hunters’ CEO and Co-Founder, and Sounil Yu, YL Ventures’ CISO in Residence.
Videos
Hunters' YouTube Channel
Visit and subscribe to our YouTube channel to stay up-to-date with all the latest video content from our experts.
Hunters XDR Demo Video
Watch this demo video to see how Hunters XDR revolutionizes your threat detection and response, transforming petabytes of security and organizational data into high-fidelity Attack Stories.
XDR: What Is It and How Does It Work In Real Life? – Hunters at a Dark Reading Panel
In this panel discussion, experts offer insights to help enterprises understand XDR, as well as the challenges and pitfalls of implementing these emerging technologies in an already-complex IT environment.
Featuring Noa Glumcher, Hunters’ Director of Marketing.
Accelerating Detection and Response Across the Attack Surface – Hunters at Ai4 Cybersecurity Event
Watch Hunters’ VP of Sales Michael Persechini present at M12’s event Ai4 Cybersecurity. In this session he explains how Hunters XDR leverages existing security tools to extend detection and response capabilities across the entire attack surface, automating security expertise to do so.
Podcasts
Hands-On Security Podcast
Check out Hunters' monthly podcast, which covers topics related to security research, security operations and best practices for practitioners.
Hosted by Dvir Sayag, Research Content Lead at Hunters.