tx-hunter

TXHunter's Differences

  • Automates Endpoint Threat Hunting Process
    It conducts a complete endpoint forensic investigation for known/unknown threats and potential risks prio and post incidence. It delivers fast, consistent, efficient and effective threat hunting results in a simple and friendly report. It detects reverse shell attacks, APTs, ransomware, malicious network connections, malicious emails, and cryptocurrency mining malware attacks.
  • Protects System and User Data Files 
    It detects and blocks known/unknown threats at real time automatically. It also performs user data files local backup with encryption and protection against ransomware attacks. 
  • Protactively Detects IOD Automatically
    It proactively detects IOD (Indicator of Difference) against the baseline and other endpoints crossing the networks, finding malicious modifications to the system and all kinds of misconfigurations as well as detecting the most stealthy and deep hidden threats at the earlist stage.
  • Agentless Operation and Vulnerability Scan
    It supports agentless ad-hoc On-demand and Offline threat hunting operatio. It also supports vulnerability scan, USB protection, rollback, memory forensics, web browser and DNS cache analysis, past run program investigation, and email forensics. Super easy to deploy in cloud or on-premise.

INSIGHTS ON MALWARE

TXSandbox provides powerful insights on executables, malicious emails, active document, script and malicious URL’s and finds new threats that signature/IOC scanning fails to detect…

More...

tx-hunter
tx-hunter

AUTOMATES ENDPOINT FORENSIC INVESTIGATION

Learn how TXHunter automates proactive endpoint threat investigation without relying on static IOCs, detecting deeply hidden advanced attacks and potential risks, and performing just-in-time threat posture measurement. It is easy and fast to deploy and use.  It collects, analyzes and interprets results in minutes not hours…

More...

COMPLETE PROTECTION WITHOUT PATCHING

Learn how TXShield goes beyond protecting the first discovery of the attack, by determining the attack methods and automatically running ‘fire-drill’ tests on other connected systems in order to block those attack methods …

More...

tx-hunter

CUSTOMER SUCCESS STORIES

Learn how a Global Forensic Response team was able to use TXHunter to rapidly identify the presence of advanced malware on a critical production windows server on one of their client’s environments.

Effective Incident Investigation requires the speed of deployment and accuracy of the hunting tools. Using TXHunter we were able to establish the scope and severity of the attack on a critical server in our customer's environment in near real-time
Bill D.
Bill D.
Global Risk Management Solutions, USA
TriagingX has exceeded our expectations enabling us to greatly enhance our threat hunting and incident response capabilities, not only in efficiency and speed, but more importantly in visibility of granular details of the actual attacks.
Jeremy Conway, President
Jeremy Conway, President
MAD Security
TXHunter provides us extra visibility into our endpoint systems security posture and potential risks. It detects advanced malware attacks without relying on known signatures and IOCs. It's simple and easy to use.
CISO
CISO
An oil and gas company

WHY TRIAGINGX?

TriagingX has extended behavior analysis capability from sandbox for a single file object to the entire endpoint system's behavior analysis, including desktop and server computers, physical or in the cloud. Besides its proactive threat hunting capability, TXHunter also accepts log files from different sources, automatically investigates thousands of those alerted endpoint systems, delivers fast, consistent, efficient and effective threat hunting results. Its deep forensic behavioral based analytic algorithm can detect advanced attacks without relying on signature, static patterns, or documented IOCs. It detects malicious network connections, malicious emails, APTs, rootkits, zombies, hidden downloads, file-less attacks, code injections, ransomware, reverse shell attacks, and cryptocurrency mining malware. It also detects misconfiguration and security posture changes. Security posture changes all the time, due to malware infection, misconfiguration or simply software updates. TXHunter keeps you aware of your security posture all time any time, and provides you immediate counter measurement for advanced attacks to avoid possible catastrophic security breaches.

You may have already invested millions dollars in alerts producers, each of such alert tries to warn you something possible bad has happened, don't ignore it! Investigating those alerts can possibly lead you to discover security posture changes and to avoid potential catastrophic security breaches. Don't worry about lacking of enough resources, let TXHunter automate threat investigation for you and provide you immediate counter measurement for those attacks, with your existing resources!

 

Award image
Award image
Award image