Hoxhunt Reviews: What Customers Are Saying

Post hero image

Table of contents

See Hoxhunt in action
Drastically improve your security awareness & phishing training metrics while automating the training lifecycle.
Get a Demo

At Hoxhunt, we pride ourselves on providing adaptive, behavior-changing security training that employees genuinely enjoy.

But don’t just take our word for it...

Below, we’ll share insights directly from customer reviews on platforms like Gartner and G2, to give you an idea of the features and outcomes you can expect from switching to Hoxhunt.

Hoxhunt reviews: here's what customers say

Ease of use

  • "The system is intuitive and very easy to use for both admins and users." – Gartner reviewer
  • "Hoxhunt is straightforward to use, even for non-tech-savvy employees." – G2 reviewer
  • "Integration was smooth, and the user interface is clean and straightforward." – Capterra reviewer

Phishing simulations

  • "The simulations are incredibly realistic, mirroring the kinds of phishing emails we see in real life." – TrustRadius reviewer
  • "I appreciate how often the phishing simulations are updated to reflect the latest threats." – G2 user
  • "Hoxhunt’s phishing emails are spot-on and have helped us identify vulnerabilities within our team." – SoftwareReviews reviewer

Employee engagement

  • "The gamification aspect makes learning fun and drives better engagement with employees." – Capterra reviewer
  • "Our team loves the competitive element—it keeps them motivated to improve their phishing detection skills." – Gartner reviewer
  • "We’ve seen a notable increase in employee participation thanks to the rewarding feedback system." – Software Advice reviewer

Reporting

  • "The reporting dashboards are excellent—they give clear, actionable insights that help us improve." – TrustRadius reviewer
  • "The analytics make it easy to track progress and identify who needs more training." – G2 user
  • "Hoxhunt provides a transparent view of organizational risk and areas for improvement." – SoftwareReviews reviewer

Quality of support

  • "Hoxhunt’s support team is quick to respond and offers thoughtful, actionable solutions." – G2 reviewer
  • "The customer success team checks in regularly and genuinely cares about improving our training outcomes." – Software Advice reviewer
  • "I’ve always had positive experiences with the Hoxhunt support team - they’re knowledgeable and very helpful." – TrustRadius reviewer

Want to read our reviews for yourself? All reviews above are from the sources below:

Hoxhunt vs legacy reviews

What sets Hoxhunt apart from other solutions?

If you want to reduce cybersecurity risk, you need to change employee behavior.

Your typical compliance-based training with basic phishing simulations doesn't go far enough to prevent real-life breaches.

69% of employees say they have knowingly bypassed their company’s cybersecurity guidance.

So, if the end goal is to protect your organization from cyber threats, why waste time and budget on inefficient training?

Adaptive training platforms get much better results because simulations are personalized to each individual employee and delivered automatically at the right time and frequency.

Here at Hoxhunt, our phishing training leverages AI to automate the entire phishing training lifecycle, so security teams can personalize their employee training at scale.

G2 Grid - Hoxhunt market leaders in security awareness training

What results can you expect using Hoxhunt?

Traditional cybersecurity training metrics result in an incomplete, misleading view of your overall security risk.

Hoxhunt gives you a complete picture of risk and measurable behavior change outcomes.

Security leaders using Hoxhunt tend to see:

  • 20x lower failure rates
  • 90%+ engagement rates
  • 75%+detect rates
  • 60% of users actively report real and simulated threats within 1 year of using Hoxhunt

This is why we partenred with AES Corporation - a Fortune 500 global energy company with over 9000 employees around the world.

AES felt that their legacy security awareness training fell short of engaging the workforce to reduce human risk.

Before making the switch over to Hoxhunt, AES assessed us with a broad group of users in a defined pilot. 

Here are the results:

  • Comparison with legacy tools: Hoxhunt outperformed the combined results of three legacy Security Awareness Training tools tested alongside it.
  • Risk reduction: A measurable decrease in organizational risk was observed within just a few months of using Hoxhunt.
  • Broad testing: Results were validated across multiple diverse test groups, emphasizing Hoxhunt’s consistent effectiveness.
AES with Hoxhunt vs Previous Solutions

How does Hoxhunt compare to legacy solutions?

Realistic, dynamic phishing simulations

  • Hoxhunt: Uses AI-driven, adaptive simulated phishing attacks and updates campaigns based on the latest real-world phishing tactics. This ensures relevance and higher efficacy in training employees to detect modern threats. Simulations can be customized by industry, threat type, employee role​ and more.
  • Legacy solutions: Typically offer static phishing templates and rely on one-size-fits-all scenarios, which may not reflect the rapidly changing cyber threat landscape.

Employee-centric engagement

  • Hoxhunt: Leverages gamification and positive reinforcement, encouraging active employee participation. It uses features like rewards, points, and leaderboards to maintain engagement, creating a more enjoyable and interactive experience​.
  • Legacy solutions: Often punitive in nature, focusing on "failure-based" reporting when employees click phishing links, which can discourage participation.

Customization and adaptability

  • Hoxhunt: Allows organizations to tailor phishing scenarios and training to their specific cyber threat landscapes, industries, and roles. The platform also adapts to employee learning levels, providing more challenging simulations as users improve​.
  • Legacy solutions: Tend to offer limited customization, with pre-set templates that may not align well with the organization's unique risks.

Reporting and analytics

  • Hoxhunt: Provides detailed and actionable insights through real-time reporting dashboards. These dashboards showcase participation rates, phishing detection performance, and organization-wide risk levels​.
  • Legacy solutions: Reports are often more generalized, with basic metrics such as "phishing email click rates" that provide limited actionable data.

User experience

  • Hoxhunt: Widely praised for its intuitive user interface and seamless integration into existing systems like Microsoft 365 and Google Workspace, reducing admin work​.
  • Legacy solutions: May require extensive setup and maintenance efforts, with clunky interfaces that reduce adoption rates among both end-users and admins.

Proactive customer support

  • Hoxhunt: Reviewers consistently praise Hoxhunt's responsive and proactive support team, ensuring smooth implementation and ongoing optimization of the program​.
  • Legacy solutions: Support may be limited to troubleshooting rather than offering ongoing program improvement assistance.

Scalability

  • Hoxhunt: Designed for scalability, making it suitable for organizations of all sizes, from SMBs to global enterprises
  • Legacy solutions: May not scale as efficiently, particularly for larger organizations with diverse geographic and operational needs.
Feature Hoxhunt Legacy Solutions
Phishing Simulations Frequent simulated emails based on real cybersecurity threat landscapes. Uses gamification elements for engagement. Predefined templates of fake emails that often lack relevance to real email threats.
Behavioral Science Designed around behavioral science with bite-sized, interactive modules to improve awareness among employees. Focus on compliance, offering dry content that doesn't adapt to engagement surveys.
Employee Engagement Incorporates gamification elements and provides individualized micro-training experiences for an engaging experience. One-size-fits-all training modules, often leading to disengaged employees.
Realism in Simulations Sends practice emails to a user's real inbox, mimicking actual spam email and dangerous emails employees may encounter. Simulations use generic spam emails that don’t reflect the complexities of online attacks.
Reporting and Insights Provides detailed threat reports to the infosec team and tracks progress over a period of time. Basic reporting with limited data, offering fewer insights into cybersecurity challenges.
Content Quality Delivers engaging, interactive training modules with high content quality and positive feedback. Library sizes vary but content is often not engaging or up-to-date with current cyber threats.

Case study: DocuSign

DocuSign is a publicly traded company founded in 2003, specializing in electronic agreements and digital transaction management.

Headquartered in San Francisco, California, it employs approximately 3,900 people globally and serves over a billion users

The Challenge

DocuSign wanted to transition from a compliance-focused to a risk-based training strategy, aiming to replace their fragmented, manual phishing training with an automated program designed to change behavior and emphasize threat reporting.

The Results

  • Award-winning awareness program with Hoxhunt as a key feature (CSO50 2021)
  • Enhanced security culture
  • Flexibility to adapt from Microsoft to Google Workspace
  • New Google Workspace button add-on, based in large part on Docusign’s requests and feedback
  • Success rate: 56.1 %
  • Fail rate 7.2 %
  • Engagement rate: 53% and-growing

Read full case study

Hoxhunt FAQ

Can Hoxhunt integrate with our existing security tools?

Yes, Hoxhunt integrates seamlessly with popular email platforms like Microsoft 365 and Google Workspace, as well as with other core security tools to enhance threat detection and reporting.

How does Hoxhunt address real-world threats?

Hoxhunt incorporates insights from current cyber threat landscapes to create realistic simulations.

This helps employees stay prepared for actual cyberattacks and improves organizational resilience against evolving threats.

How does Hoxhunt's adaptive phishing training work?

Hoxhunt automatically creates individual learning paths for each employee and selects simulated phishing campaigns based on the employee's skill, role, and location.

Employees receive gamified cyber threat simulations and interactive training on their weakest skills roughly every 10 days.

How does Hoxhunt measure training effectiveness?

As well as all the typical phishing metrics you expect like failure and engagement rate, Hoxhunt allows you to drill down into the metrics that really matter when it comes to reducing human risk...

  • Reporting Rate: This is the most critical metric Hoxhunt tracks. It reflects the percentage of employees who identify and report simulated phishing threats. A high reporting rate (recommended at 70% or higher) indicates that employees are actively learning and prepared to identify real threats in the future​.
  • Real Threat Detection Rate: Hoxhunt measures how well employees apply their training to recognize and report actual phishing attacks. An uptick in real threat detection demonstrates the program's success in preparing employees for real-world cybersecurity threats​.
  • Dwell Time: This measures the time between an employee encountering a threat and reporting it. Shorter dwell times indicate that employees are identifying and responding to threats more quickly, which is critical for preventing potential breaches​.
  • Engagement Across the Workforce: Unlike traditional training, Hoxhunt ensures that all employees, regardless of prior performance, receive frequent, personalized, and gamified training. This comprehensive approach ensures broad engagement and consistent improvement across the organization​.
  • Behavioral Metrics: Hoxhunt tracks changes in employees' behaviors, such as how effectively they recognize and act on phishing attempts over time. This is paired with continuous simulations that adapt to individual risk profiles.
Want to learn more?
Be sure to check out these articles recommended by the author:
Get more cybersecurity insights like this