PROTECTION FROM THE INSIDE OUT
Infocyte HUNT utilizes a tiered deployment model with a central HUNT server situated within your organization. Enterprises maintain the flexibility of deploying a physical or virtual HUNT "relay" in protected network segments or remote sites to effectively scan the entire constellation of endpoints. These relays perform scans within their network segment and pass the results back to the primary HUNT server for processing and display.
YOUR DATA STAYS WITH YOU
With Infocyte HUNT you retain control of your data. You have the choice of using our Incyte cloud-services for threat Intel queries (restricted to hashes, IPs, DNS, and suspicious executable analysis) or configure an on-premesis Incyte appliance and use your own (i.e. for air-gapped networks).
YOU'RE IN THE DRIVER'S SEAT
With Infocyte HUNT, there are no restrictions to number of servers and relays deployed in your environment. Scan as often as you like. Infocyte HUNT is the right choice for companies that want to incorporate threat hunting into their existing security posture and program.
The Infocyte HUNT platform incorporates three main components – the on-premises scanners, deployable endpoint surveys (i.e. dissolvable agents) and a cloud-hosted advanced analytics engine – that work together to deliver full and complete insight into any malware or suspicious elements that reside in your environment (active or dormant).
Endpoint surveys are designed to run autonomously and in parallel on a multitude of hosts, enabling HUNT to execute assessments up to 30 times faster than competing technologies.
INCYTE CLOUD SERVICECloud-hosted analytics and threat intelligence service that provides Infocyte HUNT access to up-to-date software reputation and static and dynamic malware analysis capabilities.
HUNT COREScanners reside on-premises. The primary server, HUNT Core, includes the web interface and data storage elements. Optional HUNT Relays can also be deployed to branch offices to provide distributed scanning capabilities. *Dissolvable agents are deployed to each host for the duration of a scan
ENDPOINT SURVEYSSurvey modules gather system and process information, scan memory, encrypt and send the results back to the scanner and finally dissolve. Surveys are deployed using native remote management protocols and are only present on the endpoint for the duration of the scan.
NOT ENOUGH RESOURCES? Infocyte also offers a Managed Service option for your peace of mind. On a regular schedule we will conduct the scans and execute analysis for you. Managed services are suitable for any organization that prefers to outsource their infrastructure management and security, and is comfortable with periodic security assessments.