Infocyte HUNT Named Overall APT Solution of the Year by 2017 CyberSecurity Breakthrough Awards

cybersecurity breakthrough awards

Infocyte’s post breach detection platform earns an award in APT Protection category

SAN ANTONIO – Sept. 14, 2017

Infocyte, the post breach detection leader, today announced that Infocyte HUNT™ has been selected as the ‘Overall APT Solution of the Year’ by CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies, and products in the global information security market today.

“With the number of enterprise security solutions available and over 2,000 entries, this award shows that the CyberSecurity Breakthrough Award judges recognized how Infocyte’s unique approach to post breach detection of APTs using Forensic State Analysis stands out amongst other solutions,” said Chris Gerritz, Founder of Infocyte. “We’re honored to be recognized for our innovations in threat hunting that give organizations a safety net to ensure successful attackers aren’t allowed unfettered, long-term access to their network.”

Infocyte HUNT finds malware and persistent threats that have breached defenses

The Infocyte HUNT post breach detection platform automates a traditionally services-heavy forensic collection and analysis process, empowering an organization’s IT and security teams to discover if malware or hackers have penetrated frontline defenses. It is designed to rapidly assess network endpoints, including user devices and servers, using Forensic State Analysis (FSA) for evidence of compromise, without the burden of complicated equipment or endpoint software installations. Infocyte HUNT reduces dwell time—the time that exists between infection and discovery—denying attackers the ability to persist undetected, restoring trust in a network’s health and limiting damage.

“We are thrilled to recognize Infocyte’s HUNT as the 2017 Overall APT Solution of the Year,” said James Johnson, managing director, CyberSecurity Breakthrough. “Infocyte HUNT displayed an innovative approach to threat detection, automating the threat hunting process and providing deep intelligence around suspicious activity and threats quickly and efficiently. It was a competitive field for the award, and CyberSecurity Breakthrough congratulates Infocyte’s efforts in the achievement of this recognition.”

The CyberSecurity Breakthrough Awards recognize the top companies, products, innovation, and people in the cybersecurity industry today. All entries are judged by an independent panel of experts within the information security industry, with representation from a cross-section of industry experts. The winning CyberSecurity Breakthrough selections showcase infosec technologies and companies that push ingenuity and exemplify the best in cybersecurity technology solutions across the globe.

About CyberSecurity Breakthrough
The CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web, and Email Security, UTM, Firewall and more.

About Infocyte, Inc. 
Developed by former US Air Force cybersecurity officers, Infocyte’s post breach detection technology uses Forensic State Analysis to discover the post-compromise activity of cyber attackers and malware that have bypassed other defenses. The company’s unique approach to security reduces attacker dwell time to help organizations defend networks and critical information. For more information visit or follow @InfocyteInc.

See Infocyte HUNT in Action. Request a Live Demo.

Request a Live Demo of Our Award-winning Threat Hunting and Incident Response Platform.

More from our blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

March 27, 2019

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »