Infocyte Signs Relationship Agreement with immixGroup

Infocyte HUNT to provide agentless threat hunting for defense-in-depth security to the US Federal government through preferred distributor


Federal government agencies have become a hot target for hackers and terrorists alike as illustrated by the OPM breach, making cybersecurity a top priority for these institutions.  Infocyte, a provider of hunt technology that eradicates malware and persistent threats, announced today that it has signed a relationship agreement with immixGroup to make Infocyte HUNT™ available to the US government through their contracts and partners.

immixGroup, an Arrow company, is a value-added distributor providing reliable access for government agencies to a wide range of enterprise software and hardware products. The relationship agreement will enable immixGroup to work directly with Infocyte to grow their public sector business and accelerate the sales cycle.  The Infocyte HUNT threat hunting solution will be on immixGroup’s contract vehicles and distributed through preferred business partners.

“We are pleased to work directly with immixGroup to bring Infocyte’s industry leading hunt solution to the US Federal markets,” stated Infocyte president and COO Kurt A. Mueffelmann.  “There should be no higher priority for an agency than knowing if they’re breached. Infocyte HUNT automates the threat hunting process to empower agencies to hunt without a forensics specialist. Agencies can now have confidence that malware and persistent threats have been properly identified and remediated to prevent and limit damage, without the need for third party experts.”

Infocyte HUNT is designed specifically to detect if malware is present on network endpoints. It scans and detects the post-intrusion activity, active or dormant, of attackers who have successfully evaded an organization’s real-time defenses and established a beachhead within the network. It reduces the breach detection gap – the time that exists between infection and discovery – denying attackers the ability to persist, restoring trust in a network’s health.

About Infocyte, Inc.
Developed by former US Air Force cybersecurity officers, Infocyte’s hunt technology fills a void left by today’s real-time detection solutions. By focusing on the post-compromise activity of persistent attackers and insider threats, Infocyte’s unique approach to security helps organizations defend their networks and critical information. For more information go to or follow us on @InfocyteInc.

See Infocyte HUNT in Action. Request a Live Demo.

Request a Live Demo of Our Award-winning Threat Hunting and Incident Response Platform.

More from our blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

March 27, 2019

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »