Infocyte HUNT Agentless Threat Hunting Solution Includes Linux Platforms

Infocyte HUNT, now features the ability to scan Linux endpoints

Today we are happy to announce we released Infocyte HUNT™ v2.0. Customers may notice that our product has a new name as well as some exciting new features. Formerly called Pulse, Infocyte HUNT, our agentless threat hunting platform, now features the ability to scan Linux endpoints in addition to Windows, improvements to the malware analysis engine and user experience, and enhanced performance to consistently identify both active and dormant malware on an endpoint within minutes.

We designed Infocyte HUNT so that already strapped IT departments don’t need a Ph.D. in security to hunt and identify risk. This is the first threat hunting product on the market to deliver full scope breach discovery and validation of Linux platforms. Infocyte HUNT quickly scans and validates the integrity of networked devices, in both Linux and Windows environments, to detect if anyone has successfully compromised the network.

Here’s a look at the highlights of what’s new in v2.0:

  • Newly added support for Linux allows Infocyte HUNT to scan endpoints on both Windows and Linux environments for malware and persistent threats.
  • The expansion of supervised machine learning algorithms to enhance scoring and categorizing of unknown processes and suspicious artifacts, significantly reducing analysis burden and false positives.
  • Significant customer-driven improvements to the user interface and experience including new dashboards, reporting, and customization options for hunt workflows.
  • Enhanced the under-the-hood architecture for better performance and scalability.

We also spoke to one of our partners about their experience using Infocyte Hunt and here’s what they had to say:

“Delta Risk ensures its clients have the highest confidence in the integrity of their information systems.  Infocyte has been an essential partner, empowering us to close the breach discovery gap and limit damage from unauthorized access and malware,” said Christopher J. Hendricks, Vice President, Delta Risk LLC. “Infocyte’s HUNT platform allows us to rapidly deploy to unfamiliar environments and discover malware, backdoors, and unauthorized activity across a broad range of endpoints. The platform retrieves critical data at scale, analyzes it using the latest threat intelligence and custom heuristics, and gives us the actionable information we need to respond to threats.”

For more information on the Infocyte HUNT v2.0 release read the press release or click here to learn more about how we can help you detect threats.

See Infocyte HUNT in Action. Request a Live Demo.

Request a Live Demo of Our Award-winning Threat Hunting and Incident Response Platform.

More from our blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

March 27, 2019

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »