www.activecountermeasures.com Open in urlscan Pro
2606:4700:20::681a:5be  Public Scan

Submitted URL: http://www.activecountermeasures.com/
Effective URL: https://www.activecountermeasures.com/
Submission: On February 23 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The AC-Hunter Community Edition is here! It's a bad day for the bad guys...

CHECK IT OUT

 * Home
 * AC-Hunter™
   * AC-Hunter™
   * Features
   * How It Works
   * Installation
   * Live Demo
   * Pricing
   * Partner Program
   * Brochure
   * Community Edition
 * Free Tools
   * ADHD
   * BeaKer
   * espy
   * Passer
   * RITA
   * SMUDGE
   * Threat Simulator
   * zcutter
 * Education
   * Blog
   * Events
   * Webcast Archive
   * Threat Hunt Training
   * Cyber Range
 * About
   * About Us
   * Partner Program
   * Sister Companies
   * Testimonials
 * Contact
   * Contact Us
   * Subscribe
   * Customer Login

LIVE DEMO
 * 





NETWORK THREAT DETECTION SOFTWARE

AC-Hunter™ is a software solution that continuously threat hunts your network to
identify which of your systems have been compromised.

 

There is no need to install agents on endpoints – AC-Hunter monitors and
verifies all network devices, including IoT, IIoT, and BYOD, regardless of
operating system or hardware.

 

The simple-to-use interface is focused on enabling threat hunting success for
everyone, from junior analysts to seasoned professionals.

AC-Hunter Live Interactive Demo



WHAT PROBLEM DO WE SOLVE, AND HOW DO WE HELP YOU BETTER SECURE YOUR NETWORK?

When you look at existing security solutions, they generally fall into one of
two categories:

 * They are either protection-based, focused on keeping the bad guys out;
   firewalls, intrusion detection, two-factor authentication, etc., fall into
   that category.
 * Or they are response-based, designed to be implemented once we know the bad
   guys are in the network; incident handling is a great example.

The problem is tying these two methodologies closely together. AC-Hunter bridges
this gap by quickly providing an answer to the critical question: “When have our
protections failed, and is it time to go into response mode?”



No one should be satisfied with an industry average of over six months between
when a compromise occurs and its discovery. That is not winning.

 

How do we discover and drastically reduce an attacker’s dwell time? We have a
unique and straightforward solution in AC-Hunter.


LEARN MORE ABOUT AC-HUNTER

SCHEDULE A LIVE WALKTHROUGH DEMO OF AC-HUNTER





AC-HUNTER DEMO ENVIRONMENT



TAKE AC-HUNTER FOR A LIVE “TEST DRIVE” USING OUR DEMO ENVIRONMENT

We welcome you to log in to the AC-Hunter live instance, poke around and check
it out. There is an assortment of datasets to choose from that include many
compromised hosts mixed in with regular network traffic.

 

Participating in the CTF is not required to use the AC-Hunter Demo space.
However, completing the CTF will familiarize you with using the interface and
some of the powerful features of AC-Hunter.


AC-HUNTER DEMO ENVIRONMENT





OUR PARTNER PROGRAMS

Active Countermeasures is always welcoming new partners to our community. We
have two types of partner programs…

 

Our Technology Partners verify partner products are compatible with AC-Hunter,
integrate well, and allow joint development of innovative solutions.

 

Our Channel Partners are a global network of resellers, integrators, and service
providers.

 

The Active Countermeasures team supports your sales and technical teams through
collateral, training, and joint marketing events. Your technical teams have
access to both support and development engineering.

 

Together we can strengthen and expand support for your customer’s network!


About Our Partner Program





GIVING BACK – FREE TRAINING AND TOOLS FOR THE COMMUNITY

Active Countermeasures is passionate about providing quality, no-cost
educational content, and tools for those in the security field. Whether you’re
just getting started in InfoSec or a seasoned leader, rest assured we have
something here for you.

 

Our free security training is a convenient way for you to acquire new technology
expertise in the field of Threat Hunting and more. We are continually evolving,
and we regularly host free educational webcasts offering vendor-neutral security
education to keep you (and ourselves) one step ahead of the curve.

 

We also provide open-source tools for the community, including RITA for beacon
analysis and the ADHD Security Distribution.



FREE THREAT HUNTING COURSE
EDUCATIONAL BLOG

FREE TOOLS
EVENTS




WHAT PEOPLE ARE SAYING ABOUT US


GREAT ADDITION TO OUR MONITORING CAPABILITIES

“AI-HUNTER’S ABILITY TO ANALYZE NETWORK TRAFFIC AND IDENTIFY LIKELY PATTERNS OF
MALICIOUS ACTIVITY OVER A PERIOD OF TIME IS SOMETHING THAT FLIES UNDER THE RADAR
OF MANY TRAFFIC ANALYSIS TOOLS. THIS APPROACH TO DISCOVERING MALICIOUS NETWORK
TRAFFIC IS A GREAT ADDITION TO OUR MONITORING CAPABILITIES.“

Lance Honer - Day & Zimmermann LLC



AT LAST, LET THE HUNT BEGIN!

“WE HAVE BEEN WORKING WITH TOP RIGHT GARTNER QUADRANT TOOLS FOR YEARS, YET
AI-HUNTER DELIVERED MORE CRITICAL ACTIONABLE INTELLIGENCE IN 24 HOURS THAN THE
OTHER TOOLS DID COMBINED IN 2 YEARS. AT LAST, LET THE HUNT BEGIN!“

Sam Ainscow - Barrett Steel Limited



WELL DONE ACTIVE COUNTERMEASURES!

“THIS IS THE ONLY TOOL WE HAVE THAT DETECTS X BACKDOOR.“

Finance Sector Customer -



WHAT KIND OF BLACK MAGIC IS THIS?



CERT Team - Europe



IF YOU ARE HAPPY NOT KNOWING

“IF YOU ARE HAPPY NOT KNOWING IF YOU ARE BREACHED OR NOT, DO NOT USE THIS
PRODUCT.“

Cliff Janzen OSCP - rSolutions



SIMPLICITY IS KEY FOR AI-HUNTER

“IT IS NOT TRYING TO MONITOR AND DECIPHER YOUR SYSTEM LOGS. THERE ARE NO AGENTS
TO DEPLOY. IT STRICTLY MONITORS THE CONNECTION BETWEEN YOUR INTERNAL NETWORK AND
THE INTERNET… IF YOU’RE LOOKING FOR A SIMPLE WAY TO MONITOR THE TRAFFIC BETWEEN
YOUR INTERNAL SYSTEMS AND THE INTERNET – YOU MIGHT WANT TO CHECK OUT ACTIVE
COUNTERMEASURES AND AI-HUNTER.“

Steven Bowcut CPP PSP - Editor-in-Chief for Brilliance Security Magazine



LET AI-HUNTER'S DETECTION MECHANISM DO ITS WORK

“WHEN TRYING TO DISCOVER SUSPICIOUS ACTIVITY THAT MAY HAVE SLIPPED THROUGH YOUR
OTHER SECURITY LAYERS YOU HAVE A CHOICE. YOU CAN INVESTIGATE EVERYTHING THAT YOU
FEEL LOOKS OUT OF THE ORDINARY AND SEE HOW MANY RABBIT HOLES YOU GO DOWN OR YOU
CAN LET AI-HUNTER’S DETECTION MECHANISM DO ITS WORK AND SPEND YOUR TIME LOOKING
AT WHAT MATTERS. WE CHOSE THE LATTER AND ARE DRAMATICALLY MORE EFFECTIVE AND
EFFICIENT. WITH AI-HUNTER, WE TAKE THE UNCERTAINTY OUT AND JUST GET TO WORK.“

Cliff Janzen OSCP - rSolutions

prev
next


ACTIVE COUNTERMEASURES

 * Facebook
 * Twitter
 * YouTube
 * LinkedIn

SUBSCRIBE

© Copyright 2023 - Active Countermeasures, Inc. All rights reserved.
 * Privacy Policy