Infocyte HUNT Named Overall APT Solution of the Year by 2017 CyberSecurity Breakthrough Awards
Infocyte’s post breach detection platform earns an award in APT Protection category
SAN ANTONIO – Sept. 14, 2017
Infocyte, the post breach detection leader, today announced that Infocyte HUNT™ has been selected as the ‘Overall APT Solution of the Year’ by CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies, and products in the global information security market today.
“With the number of enterprise security solutions available and over 2,000 entries, this award shows that the CyberSecurity Breakthrough Award judges recognized how Infocyte’s unique approach to post breach detection of APTs using Forensic State Analysis stands out amongst other solutions,” said Chris Gerritz, Founder of Infocyte. “We’re honored to be recognized for our innovations in threat hunting that give organizations a safety net to ensure successful attackers aren’t allowed unfettered, long-term access to their network.”
Infocyte HUNT finds malware and persistent threats that have breached defenses
The Infocyte HUNT post breach detection platform automates a traditionally services-heavy forensic collection and analysis process, empowering an organization’s IT and security teams to discover if malware or hackers have penetrated frontline defenses. It is designed to rapidly assess network endpoints, including user devices and servers, using Forensic State Analysis (FSA) for evidence of compromise, without the burden of complicated equipment or endpoint software installations. Infocyte HUNT reduces dwell time—the time that exists between infection and discovery—denying attackers the ability to persist undetected, restoring trust in a network’s health and limiting damage.
“We are thrilled to recognize Infocyte’s HUNT as the 2017 Overall APT Solution of the Year,” said James Johnson, managing director, CyberSecurity Breakthrough. “Infocyte HUNT displayed an innovative approach to threat detection, automating the threat hunting process and providing deep intelligence around suspicious activity and threats quickly and efficiently. It was a competitive field for the award, and CyberSecurity Breakthrough congratulates Infocyte’s efforts in the achievement of this recognition.”
The CyberSecurity Breakthrough Awards recognize the top companies, products, innovation, and people in the cybersecurity industry today. All entries are judged by an independent panel of experts within the information security industry, with representation from a cross-section of industry experts. The winning CyberSecurity Breakthrough selections showcase infosec technologies and companies that push ingenuity and exemplify the best in cybersecurity technology solutions across the globe.
About CyberSecurity Breakthrough
The CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web, and Email Security, UTM, Firewall and more.
About Infocyte, Inc.
Developed by former US Air Force cybersecurity officers, Infocyte’s post breach detection technology uses Forensic State Analysis to discover the post-compromise activity of cyber attackers and malware that have bypassed other defenses. The company’s unique approach to security reduces attacker dwell time to help organizations defend networks and critical information. For more information visit www.infocyte.com or follow @InfocyteInc.
Test out Infocyte's endpoint + Microsoft 365 detection and response platform for free. Sign-up for our community edition here and get started in minutes:
Would you rather run a no cost self-service assessment? Learn more about assessing your endpoints and Microsoft 365 environment with Infocyte here: