Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 55 Ratings

Total
ease
features
design
support

Description

Eyako is a centralized cybersecurity command platform created to help CISOs, CIOs, security teams, and managed security providers gain complete visibility into their organization’s cyber posture from one unified dashboard. The platform aggregates signals from governance tools, vulnerability management systems, compliance frameworks, incident management workflows, supplier risk programs, and data protection initiatives into a single operational cockpit. Eyako is designed to eliminate fragmented security management processes by replacing disconnected spreadsheets, emails, PowerPoint reports, and siloed security tools with a centralized decision-making environment. The platform allows organizations to manage risks, compliance obligations, vulnerabilities, incidents, suppliers, projects, and action plans through integrated modules that share the same operational context. Smart prioritization capabilities analyze cybersecurity data and identify which remediation actions will reduce overall risk exposure most effectively. Eyako supports major regulatory and compliance frameworks such as NIS2, DORA, ISO 27001, and GDPR while simplifying compliance tracking and reporting processes. Automated board reporting tools transform technical cybersecurity data into executive-level summaries that leadership teams can quickly understand and act upon. Security leaders can generate reports, monitor global security scores, review incidents, and track strategic priorities from one centralized interface. The platform also improves collaboration by aligning CISOs, IT teams, executives, and external partners around shared security objectives and operational visibility.

Description

Hoxhunt is a Human Risk Management platform that goes beyond security awareness to drive behavior change and (measurably) lower risk. Hoxhunt combines AI and behavioral science to create individualized micro-training moments users love, so employees learn to detect and report advanced phishing attacks. Security leaders gain outcome-driven metrics to document drastically reduced human cyber risk over time. Hoxhunt works with leading global companies such as Airbus, DocuSign, AES, and Avanade.

API Access

Has API

API Access

Has API

Screenshots View All

No images available

Screenshots View All

Integrations

Gmail
Microsoft 365

Integrations

Gmail
Microsoft 365

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Eyako

Founded

2021

Country

France

Website

www.eyako.fr/

Vendor Details

Company Name

Hoxhunt

Founded

2016

Country

Finland

Website

www.hoxhunt.com

Product Features

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Alternatives

No Alternatives

Alternatives