RESOURCES

DATA SHEETS


Infocyte HUNT Product Info

PRODUCT BROCHURE

Provides an overview of Infocyte's unique, agentless threat hunting platform capabilities and benefits.

TECHNICAL DATA SHEET

Provides a technical overview of how Infocyte HUNT works.

TECHNICAL SPECIFICATIONS

Technical specifications include the minimum configuration requirements for Infocyte HUNT. 

 

Use Cases

THREAT HUNTING

Infocyte HUNT uses Forensic State Analysis (FSA) to discover hidden threats and compromises. It sweeps thousands of endpoints, spending a couple minutes on each host, and conclusively validates their state: "Compromised" or "Not Compromised". Upon confirmation of a breach, Infocyte serves as the initial collector of live incident and forensics data on compromised hosts.

COMPROMISE ASSESSMENTS

Infocyte is the most effective solution for conducting in-house compromise assessments objectively, rapidly, and affordably without the need for an outside consultant.

ALERT VALIDATION

Infocyte HUNT provides ground truth with an automated solution to help validate alerts from your SIEM, network or endpoint product by performing a scan of the endpoint in question to determine if the threat is real so you can take swift action.
 

 

PRODUCT REVIEWS

NETWORK WORLD REVIEW

Security Tests: Threat Hunting Turns the Tables on Attackers