Infocyte HUNT: Overall APT Solution of the Year in the 2017

whispering-bell

CyberSecurity Breakthrough Awards

Cybersecurity Breakthrough Award Badge 2017

We’re pleased to announce that Infocyte HUNT has been selected as Overall APT Solution of the Year in the 2017 CyberSecurity Breakthrough Awards.

“We are thrilled to recognize Infocyte’s HUNT as the 2017 Overall APT Solution of the Year,” said James Johnson, managing director, CyberSecurity Breakthrough. “Infocyte HUNT displayed an innovative approach to threat detection, automating the threat hunting process and providing deep intelligence around suspicious activity and threats quickly and efficiently. It was a competitive field for the award, and CyberSecurity Breakthrough congratulates Infocyte’s efforts in the achievement of this recognition.”

The CyberSecurity Breakthrough Awards recognize the top companies, products, innovation, and people in the cybersecurity industry today. All entries are judged by an independent panel of experts within the information security industry, with representation from a cross-section of industry experts. The winning CyberSecurity Breakthrough selections showcase infosec technologies and companies that push ingenuity and exemplify the best in cybersecurity technology solutions across the globe.

In the award announcement, Johnson said, “2017 has been marred with an inordinate number of cybersecurity incidents, from ransomware attacks to data breaches and massive consumer data leaks.” He continued, “Now is the time for consumers and businesses to protect themselves from these increasing cyber threats. Fortunately, many companies are delivering breakthrough cybersecurity solutions, and we are committed to highlighting and showcasing these standout cybersecurity companies and products with our awards program. We are extremely pleased to present the 2017 CyberSecurity Breakthrough Award winners.”

With the number of security solution on the market and over 2,000 entries from over 12 different countries throughout the world, this award shows that the CyberSecurity Breakthrough Award judges recognize how Infocyte’s unique approach to post breach APT detection using Forensic State Analysis stands out amongst other solutions. We’re honored to be recognized for our innovations in threat hunting that give organizations a safety net to ensure successful attackers aren’t allowed unfettered, long-term access to their network.

For the full list of winners go to http://cybersecuritybreakthrough.com/award-winners

See Infocyte HUNT in Action. Request a Live Demo.

Request a Live Demo of Our Award-winning Threat Hunting and Incident Response Platform.

More from our blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

March 27, 2019

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »