Highlights from Infocyte’s Cybersecurity Excellence Award

Infocyte has been awarded a Silver 2018 Cybersecurity Excellence Product Award

cyber security excellence award
I’m pleased to announce we have been awarded a Silver 2018 Cybersecurity Excellence Product Award for Threat Hunting for our Infocyte HUNT threat hunting and compromise assessment platform. Read the announcement here.

We are honored to be recognized by the Cybersecurity Excellence Awards and the Information Security Community with this award. The win validates that our simplified threat hunting approach using Forensic State Analysis resonates with the security community as a top solution to detect and reduce the impact of hidden persistent threats.

The Cybersecurity Excellence Awards is an annual competition honoring individuals and companies that demonstrate excellence, innovation, and leadership in information security. The 2018 winners were selected on both the strength of their nomination and popular votes and comments received from the Information Security Community. Here’s what the award organizer has to say about our win:

“Congratulations to Infocyte for being recognized as a winner in the Threat Hunting product category of the 2018 Cybersecurity Excellence Awards,” said Holger Schulze, CEO of Cybersecurity Insiders and founder of the 400,000-member Information Security Community on LinkedIn that organizes the awards program. “With over 400 entries in more than 70 categories, the 2018 awards are highly competitive, and all winners truly reflect the very best in today’s cybersecurity industry.”

Winner Spotlight: Infocyte HUNT

Here’s a snapshot of the entry that made Infocyte HUNT stand out in both the judges’ and community’s minds.

Product Description

Infocyte HUNT is a dedicated threat hunting platform built by former military threat hunters responsible for protecting the largest and most targeted networks in the world. It leverages military grade techniques and practices in an automated platform to simplify the hunting process and reduce the skill set requirement for hunting malware and advanced persistent threats (APTs). When prevention and security controls fail, Infocyte HUNT significantly reduces attacker dwell time—the period between infection and discovery—to deny them the ability to persist undetected, reduce business impact, and restore trust in a network’s health.

Infocyte’s unique, agentless threat hunting platform is designed to rapidly assess network endpoints for evidence of compromise without a forensics expert. Infocyte automates the hunting process to improve the speed and efficacy of a hunting program with a unique, agentless threat hunting platform designed to rapidly assess network endpoints for evidence of compromise – without the burden of complicated equipment or endpoint software installations.

Infocyte HUNT gathers system information and scans volatile memory through patented technology with no pre-installation of software or agents; simplifying deployment and endpoint maintenance. Our unique architecture and approach enable operators to scan an enterprise network six times faster than other methods – delivering results in hours, not weeks.

It automates the search for threats and empowers an organization’s internal security teams to hunt without esoteric knowledge or a forensics expert. For the mature enterprise SOC already hunting, Infocyte HUNT enables you to do away with the custom scripts and other one-host-at-a-time DFIR processes you use to validate any suspicious behaviors that your team detects.

Why is this product or service different from the competition and deserves recognition?

  • Other companies focus on real-time detection and behavioral analytics, Infocyte’s unique approach scans the endpoints using forensic automation and patent-pending memory analysis techniques tailored to look for actual signs of malware or other compromises that made it past these first-line defenses.
  • Infocyte HUNT gathers system information and scans volatile memory through patented technology with no pre-installation of software or agents; simplifying deployment and endpoint maintenance.
  • Infocyte HUNT’s unique architecture and approach enable operators to scan an enterprise network six times faster than other methods with no specialized training or forensics knowledge to use effectively – delivering accurate results in hours, not weeks.

Learn more about what sets Infocyte HUNT apart or request a demo today.

See Infocyte HUNT in Action. Request a Live Demo.

Request a Live Demo of Our Award-winning Threat Hunting and Incident Response Platform.

More from our blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

March 27, 2019

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »