|By PR Newswire||
|August 21, 2014 04:43 PM EDT||
SAN ANTONIO, Aug. 21, 2014 /PRNewswire/ -- Infocyte, Inc., a San Antonio-based cyber security startup, announced a new service for enterprise customers called an "Intrusion Assessment." The purpose of the assessment is to proactively determine if an organization's network has been breached by identifying the tools an attacker leaves behind to retain access and steal information.
At a glance:
-- Infocyte, Inc., a San Antonio-based cyber security startup, announced a new type of proactive security assessment for enterprise customers that discovers hackers hiding on their network.
-- The "Intrusion Assessment" is designed to survey networks of 10,000 systems in less than 2 weeks.
Infocyte is initially offering Intrusion Assessments in 2 week engagements for a typical network between 1,000 – 10,000 systems. Comparable services require 4 – 12 weeks and are only performed in response to direct evidence of compromise. Infocyte's service is quick and affordable enough to be performed proactively and regularly, creating a new class of security assessment.
"Today's proactive security assessments only look for vulnerabilities and compliance. They attempt to answer the question 'Can you be compromised?'" says Ryan Morris, CTO & Co-Founder of Infocyte. "Our Intrusion Assessment answers the more critical question: 'Are you currently compromised?'".
Reports of data breaches have spiked in recent years resulting in millions in financial losses and theft of intellectual property. The groups responsible for these high profile attacks are able to persist in a large network without detection for months, sometimes years. As an example, yesterday's confirmation of 51 UPS stores being hacked took over 8 months to identify – Infocyte's Intrusion Assessment is designed to reduce this window and stem the damage from continued theft.
Infocyte leverages a proprietary software platform designed specifically to detect post-intrusion activity from entrenched and stealthy attackers. Their approach is influenced by the two founders' time in the US military where this type of action is called "Hunting" -- assume an adversary has already breached the network undetected, then systematically hunt them down.
About Infocyte, Inc.
Infocyte is a San Antonio-based developer of cyber security solutions designed to identify threats and unauthorized activity on enterprise networks. They have invented the only interactive security platform designed to rapidly scan networks for evidence of intrusion without the burden of complicated equipment or endpoint software installations. Infocyte fills a void left by today's malware protection systems by focusing detection on post-intrusion activity of attackers and insider threats. Using their unique approach, Infocyte helps organizations take the initiative in defense of their networks and critical information.
SOURCE Infocyte, Inc.
Jul. 29, 2015 09:00 AM EDT
Jul. 29, 2015 07:30 AM EDT Reads: 229
Jul. 29, 2015 07:00 AM EDT Reads: 176
Jul. 29, 2015 06:00 AM EDT Reads: 1,661
Jul. 29, 2015 04:00 AM EDT Reads: 1,721
Jul. 28, 2015 11:00 PM EDT Reads: 1,352
Jul. 28, 2015 10:45 PM EDT Reads: 1,008
Jul. 28, 2015 08:00 PM EDT Reads: 586
Jul. 28, 2015 07:15 PM EDT Reads: 715
Jul. 28, 2015 06:30 PM EDT Reads: 1,371
Jul. 28, 2015 05:30 PM EDT Reads: 254
Jul. 28, 2015 04:30 PM EDT Reads: 1,752
Jul. 28, 2015 04:00 PM EDT Reads: 2,184
Jul. 28, 2015 04:00 PM EDT Reads: 219
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
Jul. 28, 2015 03:30 PM EDT Reads: 487