Overview
What is Infocyte HUNT?
Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution. Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover…
Recent Reviews
Leaving a review helps other professionals like you evaluate Network Security Software
Be the first one in your network to review Infocyte HUNT, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- Setup fee optional
For the latest information on pricing, visithttps://www.infocyte.com/pricing
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
2 people also want pricing
Alternatives Pricing
Product Demos
World-famous 5-min Demo: Threat Hunting Platform, Infocyte HUNT
YouTube
Infocyte HUNT - Threat Hunting Tutorial - Controller Installation
YouTube
Infocyte HUNT - Threat Hunting Tutorial - Agent Installation
YouTube
Product Details
- About
- Integrations
- Competitors
- Tech Details
- Downloadables
What is Infocyte HUNT?
Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution.
Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully breached existing defenses.
According to the vendor, Infocyte HUNT uses a forensic methodology that is different from other threat hunting solutions. Other threat hunting tools rely on analyzing event based security logs from cumbersome sensors and software installed on the endpoint. Rather than analyzing security/event logs, Infocyte directly inspects live volatile memory in the host in order to gather primary data including rootkit hooks, malware persistence mechanisms, application vulnerabilities, and other digital forensics artifacts.
By deploying lightweight dissolvable agents, HUNT sweeps thousands of endpoints per hour. This sweep gathers forensic data from each host, even those without conventional detection tools installed. The collected forensic data, when combined with Infocyte's analysis automation, provides a more comprehensive picture of the state of your endpoints.
Infocyte says their approach is unique, and they call it Forensic State Analysis (FSA).
Infocyte HUNT Features
- Supported: Threat Hunting
- Supported: Compromise Assessment
- Supported: Alert Validation
- Supported: Vulnerability Scans
- Supported: Asset Discovery
Infocyte HUNT Screenshots
Infocyte HUNT Video
Overview of Infocyte HUNT v3.0
Infocyte HUNT Integrations
Infocyte HUNT Competitors
Infocyte HUNT Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux |
Mobile Application | No |