Overview
What is Inquest?
InQuest is a cybersecurity solutions provider that aims to assist organizations in defending against advanced persistent threats (APTs) and sophisticated cyber attacks. Their products and tools are designed to enhance the defensive capabilities of security operations teams and protect sensitive information....
Leaving a review helps other professionals like you evaluate Network Security Software
Be the first one in your network to review Inquest, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
Alternatives Pricing
Product Details
- About
- Tech Details
What is Inquest?
InQuest is a cybersecurity solutions provider that aims to assist organizations in defending against advanced persistent threats (APTs) and sophisticated cyber attacks. Their products and tools are designed to enhance the defensive capabilities of security operations teams and protect sensitive information. InQuest's solutions cater to organizations of all sizes, including small, medium, and large enterprises. The professionals and industries that benefit from their cybersecurity solutions include Security Operations Centers (SOCs), IT Security Professionals, Network Administrators, Incident Response Teams, and Government Agencies.
Key Features
FileTAC: Automated analysis: According to the vendor, FileTAC automates the analysis work, potentially saving SOC teams time and money. It completes its analysis in seconds, offering a faster alternative to sandbox execution or behavioral monitoring.
FileTAC: Real-time threat identification: The vendor claims that FileTAC provides real-time analytics for rapid discovery and classification of threats. This feature enables security teams to respond promptly and effectively to potential attacks.
FileTAC: Machine learning: According to the vendor, FileTAC utilizes machine learning to adapt to the ever-shifting cybersecurity landscape and detect previously unknown threats. This technology aims to enhance the detection capabilities of security operations teams.
MailTAC: Integrated Cloud Email Security (ICES): MailTAC leverages Deep File Inspection and real-time analysis to detect and prevent email-based attacks, as stated by the vendor. It aims to ensure that organizations are protected from malicious emails and phishing attempts.
MailTAC: Pre-delivery analysis and automatic quarantine: According to the vendor, MailTAC analyzes and quarantines suspicious and malicious emails before they reach end-users. This proactive approach aims to prevent potential threats from infiltrating the network.
MailTAC: Email decoration: The vendor states that MailTAC integrates informative content and banners into emails to enhance user awareness and security education. This feature aims to help users identify potential risks and adopt safe email practices.
MailTAC: Post-delivery analysis and automated remediation: According to the vendor, MailTAC retrospectively analyzes historical emails to identify previously undetected threats. This comprehensive analysis aims to ensure that organizations are protected even if threats were initially missed.
NetTAC: Encrypted session analysis: NetTAC analyzes SSL/TLS connections and encrypted session attributes to identify malicious and command and control activity, as claimed by the vendor. It provides visibility into encrypted traffic, aiming to strengthen the organization's security posture.
NetTAC: High-performance inspection: The vendor states that NetTAC swiftly detects and responds to unusual and suspicious behavior at network throughput speeds of up to 40Gb per second. This high-performance capability enables real-time threat detection and response.
NetTAC: Threat hunting automation: According to the vendor, NetTAC automates complex threat hunting processes with predefined analytical workflows and incident triage. This feature aims to streamline the investigation and response to potential threats, saving valuable time for security teams.
Inquest Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Web-Based |