tx-hunter

Why TXHunter?

  • It's faster
    It completes endpoint threat investigation in less than 3 minutes, delivers fast, consistent, efficient and effective hunting results in a simple and friendly report. 
  • It's more complete 
    It searches existing and deleted files, memory, system configuration, network, emails, browser history, DNS, firewall rules and logs, current and past ran processess, windows events, kernel models, everything that related to threats or mis configuration. It has built-in sandbox, AV engine, AL/ML, IOC and IOD query, auditing, vulnerability scanning, etc. to make sure the investigation is thorough and complete.
  • It's easier to use
    Simply download and run. Anyone can hunt for threats or potential threats and mis configuration. With a couple of mouse click, you will know exact your system's security posture.
  • It supports more options for hunting
    It supports agentless ad-hoc On-demand and Offline threat hunting operation besides managed agent option. It's equally good for post incidence threat hunting and proactive investigation.

Why TXSandbox?

TXSandbox is the first kind sandbox that is aware of the cloud, not just be able to host in the cloud but also can analyze your cloud application's behavior during attacks. If you ever wonder how your cloud application react to attack, TXSandbox can give you the answer. It provides powerful insights on your cloud application's behavior, as well as on all kinds of executables, malicious emails, active document, script and malicious URL’s and finds new threats that signature/IOC scanning fails to detect…

More...

tx-hunter
tx-hunter

Stop Ransomware

TriagingX's team never stops security innovation to left up the security bar to protect our community. <<Unavoidable ransomware trap>> is just another patent pending technology from our team. It directly targets the core business logic of ransomware, made it impossible to block user from accessing the original data files. It stops ransomware program at run time, restores user data file from encrypted format, cleans up ransomware remainings. 

More...

Why TXShield?

TXShield is a better EDR. It provides more complete detection capability and faster response. Once it detects a threat or potential threats,  it goes beyond protecting the first discovery of the attack. It immediately launches automated investigation for all connected nodes across network to pretect the network. TXShield's response is instantaneous and thorough. Here are some highlights for TXShield:

  1. It has built-in advanced sandbox, av engine, vulnerability scanning, IOC query, auditing, IOD searching, AI/ML, customizable yara rules, auto SOC, past ran process inspection, FW log analysis, and patent pending unavoidable ransomware trap. 
  2. It has built-in remote console to the endpoint system for administrating and threat mitigation;
  3. It proactively investigates what has been changed to the system, and evaluates each of such change to ensure to limit vulnerable weakness and potential threats before attac.
  4. When it stops attack, it searches for all other nodes in the network and tracks the history to find the trace of the attack. The knowledge it gains from detecting and protecting one node immediately extended to cover all nodes in the network. 
  5. It provides rich set restful APIs for integration with FW/IPS or SOAR platform or other big data platform.

tx-hunter

CUSTOMER SUCCESS STORIES

Learn how a Global Forensic Response team was able to use TXHunter to rapidly identify the presence of advanced malware on a critical production windows server on one of their client’s environments.

Effective Incident Investigation requires the speed of deployment and accuracy of the hunting tools. Using TXHunter we were able to establish the scope and severity of the attack on a critical server in our customer's environment in near real-time
Bill D.
Bill D.
Global Risk Management Solutions, USA
TriagingX has exceeded our expectations enabling us to greatly enhance our threat hunting and incident response capabilities, not only in efficiency and speed, but more importantly in visibility of granular details of the actual attacks.
Jeremy Conway, President
Jeremy Conway, President
MAD Security
TXHunter provides us extra visibility into our endpoint systems security posture and potential risks. It detects advanced malware attacks without relying on known signatures and IOCs. It's simple and easy to use.
CISO
CISO
An oil and gas company

WHY TRIAGINGX?

TriagingX has extended behavior analysis capability from sandbox for a single file object to the entire endpoint system's behavior analysis, including desktop and server computers, physical or in the cloud. Besides its proactive threat hunting capability, TXHunter also accepts log files from different sources, automatically investigates thousands of those alerted endpoint systems, delivers fast, consistent, efficient and effective threat hunting results. Its deep forensic behavioral based analytic algorithm can detect advanced attacks without relying on signature, static patterns, or documented IOCs. It detects malicious network connections, malicious emails, APTs, rootkits, zombies, hidden downloads, file-less attacks, code injections, ransomware, reverse shell attacks, and cryptocurrency mining malware. It also detects misconfiguration and security posture changes. Security posture changes all the time, due to malware infection, misconfiguration or simply software updates. TXHunter keeps you aware of your security posture all time any time, and provides you immediate counter measurement for advanced attacks to avoid possible catastrophic security breaches.

You may have already invested millions dollars in alerts producers, each of such alert tries to warn you something possible bad has happened, don't ignore it! Investigating those alerts can possibly lead you to discover security posture changes and to avoid potential catastrophic security breaches. Don't worry about lacking of enough resources, let TXHunter automate threat investigation for you and provide you immediate counter measurement for those attacks, with your existing resources!

 

Award image
Award image
Award image