× TECHNOLOGY
SOFTWARE NETWORKING CLOUD IT SERVICES MOBILE SECURITY STORAGE IOT DATA ANALYTICS CYBER SECURITY ORACLE SAP BIG DATA
BUSINESS
DIGITAL MARKETING ERP RETAIL HEALTHCARE TELECOM
MAGAZINE
CURRENT ISSUE ARCHIVE
OPINION ABOUT US CONTACT US CLIENT FEEDBACK

10 Best Security Companies 2018


ciobulletin infocyte curtis hutcheson ceo

They do it Differently: Infocyte, Threat Hunting Simplified

Cyber attacks have spiked in recent years, resulting in irreversible damages. The groups and their malicious codes can remain unseen in your systems for months or even worse for years. Such high profile attacks targeting larger networks can be disastrous. What’s more surprising is the fact that many organizations are already hacked. Security processes and defensive tools today are simply ineffective at detecting post-breach activities. Owing to the damage such hidden threats can cause for organizations, Infocyte offers HUNT that proactively hunts for such threats quickly and more effectively.

Infocyte is a computer and network security company that ‘differently’ approaches security and defends your network and data. Developers at Infocyte are former U.S. Air Force cybersecurity officers. Their collective experience building the U.S. Military’s first malware hunting team equipped them with an unmatched level of operational expertise and a highly refined perspective on how to protect the most vulnerable world today from security threats.

The idea that sparked the need for Infocyte was the weak tests and evaluations that organizations performed to prevent breaches and threats. Chris Gerritz, Founder and Chief Product Officer at Infocyte said, “We wanted to bring this threat hunting capability to the World of risk assessment… enabling organizations to find breaches.” Talking about the third-party threat hunting tools, he said, “It’s going to give you an answer that says you’re doing well or you still have security gaps. And to determine the state of a network requires not only what assets you have, or what vulnerabilities you have, but also what threats you have.”

Infocyte goes the other way around to detect threats – a completely new perspective – by assuming endpoints are already compromised. Infocyte’s simple yet powerful solution enables IT and security professionals to proactively discover malware and persistent threats, active or dormant, that has well surpassed the existing defenses and established a foothold within the network. Infocyte’s unique approach –presuming that the attack has already taken place, helps organizations defend their networks and critical information in a more effective fashion. 

Their Technology, Their Uniqueness

Infocyte HUNT is a dedicated threat hunting platform built by the experts who secured more than 800,000 nodes of the U.S. Air Force – one of the largest and targeted networks in the world. Infocyte HUNT utilizes Forensic State Analysis (FSA) to perform deep host inspections of devices. Infocyte HUNT simplifies the threat hunt process and significantly reduces the skill set required to hunt down the malware and other continuous hacking processes such as the Advanced Persistent Threats (APTs). Infocyte HUNT acts as an extra layer to existing prevention and security walls of an organization. But, differently, it reduces the attacker’s dwell time – the period between infection and discovery – denying them the ability to hide in the shadows. This approach reduces business impact and restores trust in a network’s health.

“Infocyte HUNT, the highly automated platform, can hunt an entire network in a day.  It’s more like hunting from a helicopter with a machine gun,” says Network World, reviewing the lightweight threat hunting solution of Infocyte. HUNT requires no additional sensors and is completely centered on network endpoints. The main console – normally installed as a virtual machine – send agents to all endpoints, around 60 at a time. This way, HUNT can easily scan about 25,000 machines in a day. The main console takes care of the agent deployment, response process, as well as the reporting dashboard. The console, however, connects to the Infocyte cloud for all the other heavy lifting work from detection to protection.

With active endpoint scanning, HUNT can be deployed as a primary security tool. However, its real value lies in its ability to catch advanced malware that is capable of invading and remaining anonymous until it gets executed. One other major strength of HUNT is its ability to do true memory mapping. It detects malware that survives within the memory of a system. Also, HUNT can discover malware or any type of malicious process that implements hooks to divert users or programs away from their intended destinations. HUNT, unlike other similar platforms, doesn’t just wind up by performing tests and generating reports, but it can certify that a network is completely clean and uncompromised.

The Tech Wizard – Curtis Hutcheson

Curtis Hutcheson, the CEO of Infocyte, is a man who brings a growth-oriented leadership style to the company. Mr. Hutcheson carries more than 25 years of experience working with some of the leading global technology companies. The ex-partner of Toba Capital was also GM for Dell Security Software; COO and GM at BMC software for various divisions, and was also GM for HP’s U.S. Personal Systems. Mr. Hutcheson, who is also a board member of Interset Inc., is a graduate in Business Administration, and an alumnus of the University of Texas and University of Michigan.

“Our mission is to deny attackers the ability to persist undetected inside your network.”

“Infocyte HUNT is designed to be independent, minimally invasive, and simple — in other words, you no longer need a forensic specialist to hunt threats.”

“The real vision of Infocyte is being able to answer three primary questions when you look at your environment: Are you hacked? Can you be hacked? What can be hacked?”

MAGAZINES