Find helpful case studies, webinars, and industry reports related to proactive threat detection, managed detection and response, and security best practices.

Case Studies

Banking / Financial (MSSP)

"We deployed Infocyte in ten minutes — without business interruption — allowing us to deliver instant, tangible value through our managed security services practice. Our customer was thrilled with the results."

MSSP Partner

Hospital Attack Mitigated

A hospital and level one trauma center's security team was alerted to multiple unknown file execution attempts on PC's. Infocyte's team helped detect, respond, and killed the Cobalt Strike injections in their network.

Level 1 Trauma Center/Hospital

Banking / Financial (M&A)

"Prior to completing the merger and acquisition, Infocyte helped us validate the target company’s environment and IT assets, expose unknown cyber threats, and avoid costly risks and downtime."

Lead Security Analyst
Investment Bank


"Within thirty days, we completed a proof of concept, rolled Infocyte out to our entire environment, and identified, isolated and eradicated several threats from our network—threats our existing defenses hadn't caught."

Mark Grosvenor
CTO at NFP, Inc.

Oil & Gas

"We realized instant, measurable value deploying Infocyte HUNT alongside our EDR platform — they make a great combination. Infocyte gave us expanded visibility into threats resident and hiding in live memory."

Senior IT Engineer
Utilities Company


"Infocyte gave us visibility—very quickly—across our various network segments, helping us understand how the attack had moved. We were then able to isolate and contain it, and eventually clean it from our environment."

Erik Pufahl
Director of IT at Linden Companies

Public Transit

"We were impressed with Infocyte’s methodology used to search for adversaries and malicious threats. The scans were seamless and non-invasive, and completed quickly an efficiently."

Keith Messner
CTO, Pierce Transit


"We immediately identified a wicked Mimikatz trickbot trojan infection, masked behind Ryuk ransomware—and much more. Infocyte's platform is amazing and saved our IR team a bunch of time."

Lead Incident Responder
Check Point Software


"Within twenty-four hours of deploying Infocyte HUNT, we realized the value of their MDR platform. We identified hidden malware, backdoors, unwanted programs, and suspicious code in system memory."

Network Administrator
Mass Transit Agency

Protect Your Assets. Start a Free Trial.

Start Your Free Trial of Infocyte's Detection and Response Platform.


Webinar: Flaws in the Defense-in-Depth Security Model

The Defense-in-Depth security model and its gaps, which allow attackers to persist undetected. Using the MITRE ATT&CK Model learn how post-compromise detection helps protect you from a data breach.

Webinar: 3 Challenages of Using EDR for Cyber Threat Hunting

Compare Forensic State Analysis detection techniques to traditional methods of cyber threat hunting—specifically Endpoint Detection and Response (EDR) software and the pitfalls of EDR threat hunting.

Webinar: Forensic State Analysis Threat Hunting Method

Experts from SANS Institute and Infocyte discuss adapting digital forensics and incident response techniques to proactively detect unknown threats within enterprise networks with Forensic State Analysis.

Webinar: Common Pitfalls of Log Analysis Threat Hunting

Discover the pitfalls of Log Analysis threat hunting and common misconceptions associated with it. Learn how to detect threats without relying on sophisticated infrastructure and large teams of experts.

Industry Reports

2019 Q2 Mid-market Threat & Incident Response Report

Download our Q2 2019 "Mid-market Threat and Incident Response Report" to discover what we discovered from inspecting over 550,000 systems across hundreds of environments in the first half of 2019.