You're warmly invited.... To the ultimate Happy Hour event of the season ✨ Come hang out with us on September 24th after HOU.SEC.CON at the Rustic in Houston! It's a great opportunity to connect with fellow security professionals while savoring tasty food and cocktails. Not going to HOU.SEC.CON? No worries, we’d still love to see you at the Happy Hour! Sign up here: https://hubs.li/Q02P6GsJ0
Hunters
Computer and Network Security
Tel Aviv, Israel 20,970 followers
Your Next SIEM is a SOC Platform
About us
Hunters is a Human-Driven, AI-Powered 'Next-Gen' SIEM that revolutionizes the way SOCs operate. Hunters automates the entire TDIR process, replacing repetitive human work with machine-powered detection, enrichment, correlation, prioritization, triage, and investigation, freeing analysts to proactively protect their organizations. Hunters utilizes an open security data lake architecture, ensuring complete and cost-effective coverage of the entire security stack. Companies like Booking.com and Snowflake use Hunters to empower their security teams. Hunters is backed by leading VCs and strategic investors including Stripes, YL Ventures, DTCP, Cisco Investments, Bessemer Venture Partners, U.S. Venture Partners (USVP), Microsoft’s venture fund M12, Blumberg Capital, Snowflake, Databricks, and Okta.
- Website
-
https://www.hunters.security/
External link for Hunters
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Tel Aviv, Israel
- Type
- Privately Held
- Founded
- 2018
- Specialties
- XDR, Extended Detection and Response, Security Analytics, ML, AI, SOC, CISO, SIEM, Cyber Security, Security Operations, SecOps, Security Data Lake, and SOC Platform
Products
Hunters Next-Gen SIEM | SOC Platform
Data-Centric Security Software
Human-Driven, AI-Powered 'Next-Gen' SIEM Hunters revolutionizes the way SOCs operate. Hunters automates the entire TDIR process, replacing repetitive human work with machine-powered detection, enrichment, correlation, prioritization, triage, and investigation, freeing analysts to proactively protect their organizations. Hunters utilizes an open security data lake architecture, ensuring complete and cost-effective coverage of the entire security stack. Companies like Booking.com and Snowflake use Hunters to empower their security teams.
Locations
-
Primary
82, Yigal Alon St.
Tel Aviv, Israel, IL
-
Newton, MA 02466, US
-
1 Poultry
Moorgate, England EC2R 8EJ, GB
Employees at Hunters
Updates
-
📣 Attention NorCal Cybersecurity professionals! We're heading to at ISACA Sacramento next Tuesday, September 10th. Our West Territory Manager, Hans Christoph, is looking forward to connecting with you there! Registration is open, save your seat! https://hubs.li/Q02NT6K30
-
🧢s off to our August winners of the Hunters badge blitz! Our August winners include several Hunters Games CTF players, as well as certification achievers! Luis Cárdenas Alyce Wheeler Jonathan Villegas Kaung Zaw Hein Julio Serrata Francisco Jose Gutierrez Medina Antonije Nujić Charles Sawadogo Houda Azzouni Shamreen Basheer Jason McDaniel Thank you for investing time in growing your SecOps knowledge! Continuous learning and practice are key to protecting your organizations from cyber threats. ✨ To be featured in September: 1. Complete your Hunters Academy – Technical Foundations or Practitioner (beta) certification 2. Add your badge to your LinkedIn profile & share it in a post with your LinkedIn Network 3. Tag @Hunters in the post to help us find it!
-
Back 2 School with Hunters 🍎📏 Our Tel Aviv office recently kicked off the new school year in style! We began the day with a nostalgic school breakfast featuring cereal and wrapped it up by distributing backpacks filled with essential supplies for kids to embark on their school journey. Wishing everyone a fantastic start to the new school year!
-
📈 Transform your cybersecurity approach to protect your assets while also driving business growth. Discover how Xactly Corp CISO, Matt Sharp, and his team restructured their program with a Snowflake Security Data Lake, allowing them to manage their own data and replace underperforming vendors to maintain a best-of-breed security stack. Read more: https://hubs.ly/Q02NtKyr0
-
Hunters has been named a Fast Moving Leader ⚡ In the GigaOm Radar for Security Information and Event Management(SIEM). Hunters is recognized for automating the entire threat detection, investigation, and response process, including: - Removing false positives & excessive alerting - Auto enriching & contextualizing data - Reducing redundant triage efforts - Providing a holistic view of threats Read the full report: https://hubs.li/Q02N9Sv_0
-
Whether you're a seasoned cybersecurity pro or just dipping your toes in the field, you'll uncover valuable insights in "The Beginner's Guide to Securing Kubernetes." Inside this blog, you'll discover: 🔺The basics of Kubernetes, including its core components 🔺Practical tips for detecting threats and steps for thorough investigations 🔺The critical security aspects such as control plane protection, pod security policies, and the importance of auditing Created by Security Research Team Leader, Ophir Kelman, with practitioners in mind - don't miss out on this crucial resource to strengthen your Kubernetes security knowledge. https://hubs.li/Q02N51p30
-
In the evolving cybersecurity landscape, traditional security information and event management (SIEM) strategies often fall short. This year at Black Hat Conference 2024, Hunters' VP of Solutions Engineering, Ian Forrest, had the chance to discuss How to Implement a Scalable Modern Security Data Lake with PENNYMAC's CISO, Cyrus Tibbs, and Snowflake's Head of Cybersecurity Strategy, John Bland. This session explores: ➡️ the transition from conventional security practices to security data lakes 💽 security data lakes as central repositories for storing and normalizing data 🖥️ separation of storage and compute Watch now: https://hubs.li/Q02MNYvY0
-
Ingesting data at security scale is a challenge, OCSF can help. Hunters' CTO, Yuval Itzchakov, discusses how the OCSF format lowers the barriers for data entry into your security data lake, ensuring it is structured and of high quality, and highlights its significance for the cybersecurity ecosystem.
-
Team Axon investigated it, now let's dive in together... A few months back, the Hunters' internal threat hunting team uncovered a significant vulnerability in GCP, which they named #DeleFriend. Join Hunters’ Threat Researcher, Yonatan K., and Orca Security's Cloud Threat Researcher, Roi Nisimi, as they join forces to demonstrate: ☁️ How GCP and Google Workspace are interconnected 🔎 How to detect and prevent an attack 🛑 What you need to do to protect yourself https://hubs.li/Q02MC7JX0
Orca Security & Hunters: Exploring a Severe Design Weakness in Google Workspace
https://www.youtube.com/