NETWORK THREAT DETECTION SOFTWARE

AC-Hunter™ is a software solution that continuously threat hunts your network to identify which of your systems have been compromised.

 

There is no need to install agents on endpoints – AC-Hunter monitors and verifies all network devices, including IoT, IIoT, and BYOD regardless of operating system or hardware.

 

The simple-to-use interface is focused on enabling threat hunting success for everyone from junior analysts to seasoned professionals.

What Problem Do We Solve, and How Do We Help You Better Secure Your Network?

When you look at existing security solutions, they generally fall into one of two categories:

 

  • They are either protection-based, which is focused on keeping the bad guys out; firewalls, intrusion detection, two-factor authentication, etc. fall into that category.
  • Or they are response-based, which are designed to be implemented once we know the bad guys are in the network; incident handling is a great example of that.

 

The problem is tying these two methodologies closely together.

 

AC-Hunter bridges this gap by quickly providing an answer to the important question: “When have our protections failed, and is it time to go into response mode?”

No one should be satisfied with an industry average of over six months between when a compromise takes place and its discovery. That is not winning.

 

How do we discover and drastically reduce an attacker’s dwell time? We have a unique and straightforward solution in AC-Hunter.

SCHEDULE A LIVE WALKTHROUGH DEMO OF AC-HUNTER
LEARN MORE ABOUT AC-HUNTER

AC-Hunter CTF Demo

Take AC-Hunter for a Live “Test Drive” Using Our CTF Environment

 

We welcome you to log in to the AC-Hunter live instance, poke around and check it out. There is an assortment of datasets to choose from that include many compromised hosts mixed in with normal network traffic.

 

Participating in the CTF is not required to use AC-Hunter. However, completing the CTF will familiarize you with using the interface and some of the powerful features of AC-Hunter.

AC-HUNTER CTF ENVIRONMENT

Giving Back – Free Training and Tools for the Community

Active Countermeasures is passionate about providing quality no-cost educational content and tools for those in the security field. Whether you’re just getting started in InfoSec or a seasoned leader, rest assured we have something here for you.

 

Our free security training is a convenient way for you to acquire new technology expertise in the field of Threat Hunting and more. We are continually evolving, and we regularly host free educational webcasts offering vendor-neutral security education to keep you (and ourselves) one step ahead of the curve.

 

We also provide many open-source tools for the community, including RITA for beacon analysis, and the ADHD Security Distribution.

What People Are Saying About Us

GREAT ADDITION TO OUR MONITORING CAPABILITIES

“AI-Hunter’s ability to analyze network traffic and identify likely patterns of malicious activity over a period of time is something that flies under the radar of many traffic analysis tools. This approach to discovering malicious network traffic is a great addition to our monitoring capabilities.“
Lance Honer - Day & Zimmermann LLC

AT LAST, LET THE HUNT BEGIN!

“We have been working with top right Gartner quadrant tools for years, yet AI-Hunter delivered more critical actionable intelligence in 24 hours than the other tools did combined in 2 years. At last, let the hunt begin!“
Sam Ainscow - Barrett Steel Limited

WELL DONE ACTIVE COUNTERMEASURES!

“This is the only tool we have that detects X backdoor.“
Finance Sector Customer -

WHAT KIND OF BLACK MAGIC IS THIS?

CERT Team - Europe

IF YOU ARE HAPPY NOT KNOWING

“If you are happy not knowing if you are breached or not, do not use this product.“
Cliff Janzen OSCP - rSolutions

SIMPLICITY IS KEY FOR AI-HUNTER

“It is not trying to monitor and decipher your system logs. There are no agents to deploy. It strictly monitors the connection between your internal network and the internet… if you’re looking for a simple way to monitor the traffic between your internal systems and the internet – you might want to check out Active Countermeasures and AI-Hunter.“
Steven Bowcut CPP PSP - Editor-in-Chief for Brilliance Security Magazine

LET AI-HUNTER'S DETECTION MECHANISM DO ITS WORK

“When trying to discover suspicious activity that may have slipped through your other security layers you have a choice. You can investigate everything that you feel looks out of the ordinary and see how many rabbit holes you go down or you can let AI-Hunter’s detection mechanism do its work and spend your time looking at what matters. We chose the latter and are dramatically more effective and efficient. With AI-Hunter, we take the uncertainty out and just get to work.“
Cliff Janzen OSCP - rSolutions