San Antonio, TX – February 10, 2016 – Infocyte, a San Antonio-based cybersecurity company, will unveil its Pulse Malware Hunter product on Wednesday, Feb. 10, 11 a.m. at the Geekdom Event Center, 131 Soledad Street. Following the event, there will be an open house from noon to 5 p.m. in the Infocyte office on Geekdom’s 7th Floor. The open house will feature interactive product demos allowing security professionals to become the “hunter” and discover network breaches.
“Despite massive investment in protection technologies, hackers continue to demonstrate clever ways to bypass enterprise defenses,” Chris Gerritz, Infocyte’s Chief Executive Officer said. “Pulse is the safety net. It periodically scans and validates the integrity of networked devices to discover if any malicious software – active or dormant – successfully compromised the network.”
According to the latest industry report from FireEye, the median time to discover a breach after one has occurred is 205 days. Additionally, 66% percent of these are discovered through a third-party such as law enforcement or a public news article, putting the company in a reactive crisis management position.
“Pulse’s focused compromise detection enables organizations to discover security breaches much earlier and on their own terms,” said Russ Morris, Infocyte’s chief technology officer. “The software checks each device for all known variants of malicious software and also highlights any unknown software that looks or acts like malware.”
The two co-founders, Gerritz and Morris, served as cyber warfare officers within the U.S. Air Force on Lackland Air Force Base. After leaving active duty, both took part in the San Antonio Chamber of Commerce’s first cybersecurity startup boot camp to solidify their business plan for Infocyte.
John Dickson, the chairman of the Greater San Antonio Chamber of Commerce’s IT Committee, will introduce Infocyte’s Executive Leadership Team at this event.
“Chris, Russ, and others on their team have unique experiences gained while in the military,” said Dickson, a former Air Force information assurance officer and a principal with The Denim Group. “To me, they represent the second generation of local, ex-military cybersecurity professionals who have capitalized on what they learned on active duty to create a solution that truly addresses the changing needs of commercial organizations.”
Infocyte develops proactive cybersecurity solutions designed to hunt for threats and unauthorized activity within enterprise networks. The Infocyte hunt methodology fills a void left by today’s malware protection systems by focusing detection on the post-compromise activity of persistent attackers and insider threats. With a unique approach, Infocyte helps organizations take the initiative in defense of their networks and critical information. For more information, go to www.infocyte.com.
Matt Scherer, Press Relations
More from our blog
Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.Read More »
In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…Read More »
A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…Read More »