Infocyte Released HUNT™ v2.0
Endpoint hunting identifies active and dormant malware missed by security monitoring, drastically reducing the breach detection gap and strengthening defense-in-depth strategies
SAN ANTONIO, TX | June 9, 2016
Infocyte, a provider of agentless threat hunting technology that eradicates malware and persistent threats, today released Infocyte HUNT™ v2.0 (formerly called Infocyte Pulse). The agentless threat hunting platform now features the ability to scan Linux endpoints in addition to Windows, improvements to the malware analysis engine and user experience, and enhanced performance to consistently identify both active and dormant malware on an endpoint within minutes. Proactive threat hunting with Infocyte HUNT reduces the breach detection gap and is a critical part of any enterprise defense-in-depth strategy.
“With Infocyte, already strapped IT departments don’t need a Ph.D. in security to hunt and identify risk. Infocyte HUNT v2.0 is the first threat hunting product on the market to deliver full scope breach discovery and validation of Linux platforms,” said Chris Gerritz, chief executive officer of Infocyte. “It quickly scans and validates the integrity of networked devices, in both Linux and Windows environments, to detect if anyone has successfully compromised the network.”
Key new features of Infocyte HUNT v2.0 include:
- Newly added support for Linux allows Infocyte HUNT to scan endpoints on both Windows and Linux environments for malware and persistent threats.
- The expansion of supervised machine learning algorithms to enhance scoring and categorizing of unknown processes and suspicious artifacts, significantly reducing analysis burden and false positives.
- Significant customer-driven improvements to the user interface and experience including new dashboards, reporting, and customization options for hunt workflows.
- Enhanced the under-the-hood architecture for better performance and scalability.
Christopher J. Hendricks, Vice President, Delta Risk LLC, said, “Delta Risk ensures its clients have the highest confidence in the integrity of their information systems. Infocyte has been an essential partner, empowering us to close the breach discovery gap and limit damage from unauthorized access and malware.” Hendricks continued, “Infocyte’s HUNT platform allows us to rapidly deploy to unfamiliar environments and discover malware, backdoors, and unauthorized activity across a broad range of endpoints. The platform retrieves critical data at scale, analyzes it using the latest threat intelligence and custom heuristics, and gives us the actionable information we need to respond to threats.”
Infocyte HUNT is designed specifically to detect if malware is present on the network. It scans and detects the post-intrusion activity, active or dormant, of attackers who have successfully evaded an organization’s real-time defenses and established a beachhead within the network. It reduces the breach detection gap – the time that exists between infection and discovery – denying attackers the ability to persist, restoring trust in a network’s health.
About Infocyte, Inc.
Developed by former US Air Force cybersecurity officers, Infocyte’s hunt technology fills a void left by today’s real-time detection solutions. By focusing on the post-compromise activity of persistent attackers and insider threats, Infocyte’s unique approach to security helps organizations defend their networks and critical information. For more information, visit www.infocyte.com or follow us on Twitter @InfocyteInc.
More from our blog
Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.Read More »
In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…Read More »
A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…Read More »