This post was last updated on April 12th, 2021 at 12:10 pm

Infocyte's Free Community Edition

Trusted by Check Point, AT&T, Grant Thornton, PwC, and 1,000's of customers, Infocyte is offering access to its platform for free for up to 25 hosts.

How Infocyte provides value:

- Run a self-service assessment of your Microsoft 365 environment against industry benchmarks using an API inspection

- Conduct a self-service deep assessment of your endpoints for past, present, and potential security risks using our patented Memory Forensics approach

- Utilize our platform to automate and scale your endpoint and/or Microsoft 365 detection and response efforts

Sign up and start your self-assessment or threat hunting within minutes!

  • Please enter your business email
  • Requirements: 50 characters max, alphanumeric only and must be unique. Example:
  • This field is for validation purposes and should be left unchanged.

The fine print: Infocyte Community Edition includes all of the features of Infocyte's Platform for a limited number of hosts and seven days of data retention, all at absolutely no cost to you. For our Microsoft 365 security compliance module, Infocyte will allow inspection of one domain and show the security check results. These capabilities will be available to community edition subscribers for up to one year. Infocyte’s platform is also SOC 2 compliant and all data collected for analysis is segregated and private.

Use Cases

Reduce risk, achieve and maintain compliance, and optimize security operations.

Asset Discovery

Quickly enumerate and catalog assets, applications, hosts, etc. on your network to pinpoint unauthorized devices and environmental vulnerabilities.

Proactive Detection

Patent-pending memory analysis and AI-powered threat intel enables security teams to detect and respond quickly — without relying on historical log data.

Incident Response

Automate incident response investigations, including Root Cause Analysis and alert triage, streamline remediation efforts, and reduce your time to detect and respond.


Identify vulnerable applications, accounts, hosts, and more, so you can close the gaps in your cyber defenses and address vulnerabilities before they're exploited.

Compromise Assessments

Conclusively validate your security posture to identify gaps in your defensive layers and identify systems that can be — or currently are — compromised.

Alert Validation

Leverage a powerful API and library of integrations to instantly validate SIEM alerts and initiate forensic inspections, returning a state of compromised or not.