tx-hunter

TXHunter's Differences

  • Automates Endpoint Threat Hunting Process
    It conducts a complete endpoint (desktop and server) forensic analysis for known/unknown threats and potential risks. It delivers fast, consistent, efficient and effective threat hunting results in a simple and friendly report.
  • Detects Hidden and Advanced Threats
    Its machine-assisted behavioral based forensic analytic engine goes beyond static IOC query to detect hidden and advanced threats. It detects reverse shell attacks, APTs, ransomware, malicious network connections, malicious emails, and cryptocurrency mining malware attacks.
     
  • Protects User Data Files 
    It automatically backs up and encrypts user data files locally with protection. User can easily retrieve and restore their data files even after ramsomware attacks.
     
  • Automates Security Posture Measurements
    Security posture changes all the time due to configuration changes, software updates, malicious attacks, etc. TXHunter measures endpoint security posture everytime when it hunts. 
  • Supports Online, Offline, and Managed Hunting Modes
    Its agentless ad-hoc operation supports Online and Offline threat hunting. Its managed agent supports proactive hunting, user can start hunting process by scheduling it for daily, weekly or monthly. It also supports batch hunting process by inputing FW/SIEM/EDR log files. It also has monitoring, blocking, and remotely remediation options.

INSIGHTS ON MALWARE

TXSandbox provides powerful insights on executables, malicious emails, active document, script and malicious URL’s and finds new threats that signature/IOC scanning fails to detect…

More...

tx-hunter
tx-hunter

AUTOMATES ENDPOINT FORENSIC INVESTIGATION

Learn how TXHunter automates proactive endpoint threat investigation without relying on static IOCs, detecting deeply hidden advanced attacks and potential risks, and performing just-in-time threat posture measurement. It is easy and fast to deploy and use.  It collects, analyzes and interprets results in minutes not hours…

More...

COMPLETE PROTECTION WITHOUT PATCHING

Learn how TXShield goes beyond protecting the first discovery of the attack, by determining the attack methods and automatically running ‘fire-drill’ tests on other connected systems in order to block those attack methods …

More...

tx-hunter

CUSTOMER SUCCESS STORIES

Learn how a Global Forensic Response team was able to use TXHunter to rapidly identify the presence of advanced malware on a critical production windows server on one of their client’s environments.

Effective Incident Investigation requires the speed of deployment and accuracy of the hunting tools. Using TXHunter we were able to establish the scope and severity of the attack on a critical server in our customer's environment in near real-time
Bill D.
Bill D.
Global Risk Management Solutions, USA
TriagingX has exceeded our expectations enabling us to greatly enhance our threat hunting and incident response capabilities, not only in efficiency and speed, but more importantly in visibility of granular details of the actual attacks.
Jeremy Conway, President
Jeremy Conway, President
MAD Security
TXHunter provides us extra visibility into our endpoint systems security posture and potential risks. It detects advanced malware attacks without relying on known signatures and IOCs. It's simple and easy to use.
CISO
CISO
An oil and gas company

WHY TRIAGINGX?

TriagingX has extended behavior analysis capability from sandbox for a single file object to the entire endpoint system's behavior analysis, including desktop and server computers, physical or in the cloud. Besides its proactive threat hunting capability, TXHunter also accepts log files from different sources, automatically investigates thousands of those alerted endpoint systems, delivers fast, consistent, efficient and effective threat hunting results. Its deep forensic behavioral based analytic algorithm can detect advanced attacks without relying on signature, static patterns, or documented IOCs. It detects malicious network connections, malicious emails, APTs, rootkits, zombies, hidden downloads, file-less attacks, code injections, ransomware, reverse shell attacks, and cryptocurrency mining malware. It also detects misconfiguration and security posture changes. Security posture changes all the time, due to malware infection, misconfiguration or simply software updates. TXHunter keeps you aware of your security posture all time any time, and provides you immediate counter measurement for advanced attacks to avoid possible catastrophic security breaches.

You may have already invested millions dollars in alerts producers, each of such alert tries to warn you something possible bad has happened, don't ignore it! Investigating those alerts can possibly lead you to discover security posture changes and to avoid potential catastrophic security breaches. Don't worry about lacking of enough resources, let TXHunter automate threat investigation for you and provide you immediate counter measurement for those attacks, with your existing resources!

 

Award image
Award image
Award image