ANNOUNCING

Hunter

Efficient, targeted, intuitive investigation
Announcing the latest release of Hunter for Fraud Investigations

A platform designed to improve the fraud investigation process to make it easier and quicker to stay ahead of threat actors and unmask attackers by helping users efficiently attribute identities and identify further intelligence across multiple data sources simultaneously to expose the true identity of threat actors.

To learn more about the latest release of Hunter read our blog.

01

Simple, targeted threat analysis and search

Empower users to simply start with an attribute search and pivot, enriching information, making correlations across data sources and collating intelligence in one place. Search multiple attributes at once with our bulk search feature.

02

Comprehensive, intuitive visualizations

Visualize collected data in a dedicated, controlled workspace to easily identify links and conduct network analysis for a complete investigative picture—incorporating multiple sources and manual entries, downloading, saving and uploading, as needed.

03

Automated data correlations and target packs

Save time and resources by producing actor summaries through automated breach data correlations, and build comprehensive profiles by recording targeted intelligence in dedicated target areas.

04

Fluid investigation management

Create multiple investigations and share with colleagues for collaborative working—building case-specific results, graphs, target packs, notes—archiving for future access or auditing—and deleting when no longer needed.

Password pivoting

Improve real identification by identifying additional accounts using passwords collected from breaches

Malicious scores

Use ML-produced scoring of entities associated with malicious breaches to gain context into how malicious search terms might be

Total privacy

Completely protect searches from outside detection using our proprietary encryption methods—not even our teams can view which searches are conducted

Configuration

Configure the platform to provide proxies to obfuscate your investigations, and use strong audit capabilities to monitor what searches are conducted

Featured Content

Datasheet

Fraud Investigations

Hunter webinar image

Webinar

Hunter for Investigations