Today we are happy to announce we released Infocyte HUNT™ v2.0. Customers may notice that our product has a new name as well as some exciting new features. Formerly called Pulse, Infocyte HUNT, our agentless threat hunting platform, now features the ability to scan Linux endpoints in addition to Windows, improvements to the malware analysis engine and user experience, and enhanced performance to consistently identify both active and dormant malware on an endpoint within minutes.
We designed Infocyte HUNT so that already strapped IT departments don’t need a PhD in security to hunt and identify risk. This is the first threat hunting product on the market to deliver full scope breach discovery and validation of Linux platforms. Infocyte HUNT quickly scans and validates the integrity of networked devices, in both Linux and Windows environments, to detect if anyone has successfully compromised the network.
Here’s a look at the highlights of what’s new in v2.0:
- Newly added support for Linux allows Infocyte HUNT to scan endpoints on both Windows and Linux environments for malware and persistent threats.
- The expansion of supervised machine learning algorithms to enhance scoring and categorizing of unknown processes and suspicious artifacts, significantly reducing analysis burden and false positives.
- Significant customer-driven improvements to the user interface and experience including new dashboards, reporting, and customization options for hunt workflows.
- Enhanced the under-the-hood architecture for better performance and scalability.
We also spoke to one of our partners about their experience using Infocyte Hunt and here’s what they had to say:
“Delta Risk ensures its clients have the highest confidence in the integrity of their information systems. Infocyte has been an essential partner, empowering us to close the breach discovery gap and limit damage from unauthorized access and malware,” said Christopher J. Hendricks, Vice President, Delta Risk LLC. “Infocyte’s HUNT platform allows us to rapidly deploy to unfamiliar environments and discover malware, backdoors, and unauthorized activity across a broad range of endpoints. The platform retrieves critical data at scale, analyzes it using the latest threat intelligence and custom heuristics, and gives us the actionable information we need to respond to threats.”