An Exciting Time for Infocyte
This is an exciting time for Infocyte. We just closed a Series B Round of funding that will allow us to more quickly scale our growth and meet the growing demand for Infocyte HUNT.
Our purpose at Infocyte is clear. We enable your security and IT teams to find hidden threats in a simple way, so you can remove the risk before it becomes a serious issue. We strive to be the most responsive partner you work with to safeguard the health of your network. Together we can effectively reduce threat dwell time and lower the risk for the business.
We have several new product enhancements planned for early 2018 including broader deployment capabilities, and UI and reporting improvements. As always, we will continue to stay ahead of the latest evasion techniques to ensure you can detect endpoint threats and maintain your network health.
I am very excited to be leading Infocyte through its next chapter and, most of all, deliver value to and support all our loyal and future customers and partners.
CEO | Infocyte
More from our blog
Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.Read More »
In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…Read More »
A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…Read More »