tx-hunter

THE TRIAGINGX DIFFERENCE

  • Automate Threat Hunting Playbook
    It simplifies the endpoint threat hunting process.  User only needs to input endpoint IP address, it will automatically conduct the investigation.
     
  • Proactively Detect Hidden and Unknown Threat
    Its machine-assisted behavioral based analytic  investigation engine goes beyond IOC query to detect hidden and unknown threat. It also exposes the potential hidden risks.
     
  • Adaptive Algorithm
    It goes beyond first discovery, by determining the attack methods, and automatically running fire-drill tests on other connected systems.
     
  • Benefits
    It delivers fast, consistent, efficient and effective threat hunting results in a simple and friendly report.

INSIGHTS ON MALWARE

TXSandbox provides powerful insights on executables, active document, script and malicious URL’s and finds new threats that signature/IOC scanning fails to detect…

More...

tx-hunter
tx-hunter

INSIGHTS ON ENDPOINTS

Learn how TXHunter conducts highly focused incident investigations remotely. It is easier and faster to deploy than EDR or ad-hoc tools, and collects, analyzes and interprets results in minutes not hours…

More...

COMPLETE PROTECTION WITHOUT PATCHING

Learn how TXShield goes beyond protecting the first discovery of the attack, by determining the attack methods and automatically running ‘fire-drill’ tests on other connected systems in order to block those attack methods …

More...

tx-hunter

CUSTOMER SUCCESS STORIES

Learn how a Global Forensic Response team was able to use TXHunter to rapidly identify the presence of advanced malware on a critical production windows server on one of their client’s environments.

Effective Incident Investigation requires the speed of deployment and accuracy of the hunting tools. Using TXHunter we were able to establish the scope and severity of the attack on a critical server in our customer's environment in near real-time
Bill D.
Bill D.
Global Risk Management Solutions, USA

WHY TRIAGINGX?

TXHunter automates the endpoint investigation “playbook”.  When a suspect endpoint is identified from the Security Operation or Helpdesk team (or technology), a small disposable agent is deployed to the endpoint.  It simply collects the relevant artifacts to determine if the system has been compromised and runs a series of hypotheses of various attacks on that data.  If it identifies malicious activities, it then collects the associated files and uploads them for analysis with the integrated next-generation sandbox.  A comprehensive report is then generated and placed into the workflow for review and remediation. The entire process can happen in about 15 minutes. 

Bottom line, TXHunter automates the endpoint investigation playbook, improving the quality and speed of the investigations, rendering those results in easy to understand format while driving down the costs.

Most of our customers acknowledge that one of their primary challenges is how to deal with the large number of alerts they receive from their AV, EDR, SIEM or helpdesks.  They need an effective and efficient method to investigate these endpoints, workstations and servers to determine if they have been compromised.  TXHunter will allow them to address this need with their existing resources, improving the quality of their work and allowing them to scale to meet the company’s needs. Of course, failure to meet this need can be catastrophic, allowing an uninvestigated alert to turn into a potential breach.

 

Award image
Award image
Award image