Infocyte HUNT Questions

Julia Frohwein
Content and Social Media Manager
IT Central Station

Hi Everyone,

What do you like most about Infocyte HUNT?

Thanks for sharing your thoughts with the community!

Miriam Tover
Content Specialist
IT Central Station

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

Miriam Tover
Content Specialist
IT Central Station

Please share with the community what you think needs improvement with Infocyte HUNT.

What are its weaknesses? What would you like to see changed in a future version?

Miriam Tover
Content Specialist
IT Central Station

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Miriam Tover
Content Specialist
IT Central Station

If you were talking to someone whose organization is considering Infocyte HUNT, what would you say?

How would you rate it and why? Any other tips or advice?

Endpoint Detection and Response (EDR) Questions
Prem
Analyst at a security firm with 501-1,000 employees
Mar 15 2021

I'm an Analyst, Managed Security Services in a Legal firm. Where can I find information about pricing of multiple EDR solution and the support levels provided?

Rony_Sklar
IT Central Station
Nov 02 2020

With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?

Philippe PanardieThere is not a single answer. In our company, we use only company devices for… more »
Letsogile BaloiSecurity is a multi-layered problem and as always the human end is the weak… more »
Omer MohammedWearing a mask while accessing your service is not a joke hardening tunneling… more »
PaulBecker
Senior Manager- Security Monitoring and Incident Response at Clarios

I'm a Senior Manager- Security Monitoring and Incident Response at a large manufacturing company. 

I am looking for thoughts from those who may have done a comparative analysis on these two products within the last 6 months or so.  Realizing these technologies have advanced rapidly over the past year or two I would like to hear some current observations.

While I am interested in the value/functionality of the platforms, I am currently focused on  assessments around EDR performance and ultimate functionality.

Thanks in advance for your thoughts.

Steve PenderIf you're looking for a NextGen, Machine Learning & AI-driven Active EDR with… more »
ITSecuri7cfdWe didn't consider either of these after demo and comparison from reviews of… more »
NeilCesarioHiya Paul, I'm a bit biased as we are partnered with Cynet Security. We've done… more »
Menachem D Pritzker
Director of Growth
IT Central Station

On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.

Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.

The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.

How could Twitter have been better prepared for this? How do you rate their response?

Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »
Ken ShauretteI like the potential for catching an unusual activity like that with our… more »
Russell WebsterSpan of control, Solid RBAC, Privileged Access Management (PAM) 
Rony_Sklar
IT Central Station

How can businesses ensure that they are protected from EternalBlue attacks?

Marc VazquezThe best part of AI products like Sentinel one is they are monitoring for this… more »
Dr Trust Tshepo MapokaEternalBlue exploits officially named MS17-010 by Microsoft is a vulnerability… more »
Nikki WebbEternalBlue exploits a vulnerability in outdated versions of Microsoft Server… more »
Rony_Sklar
IT Central Station

How can businesses protect themselves against Mimikatz malware?

Technicalconsult568Mimiktaz is a post exploitation tool that dumps passwords from memory… more »
Steve PenderMimikatz is a tool developed by Benjamin Delpy that is used to gather credential… more »
Bryan HurdBesides having Microsoft Defender which detects this threat, also the newest… more »
Rony_Sklar
IT Central Station

There are many EDR solutions out there. In your opinion, what are the most important features that an EDR solution should have? 

Additionally, what are good questions to ask vendors when researching EDR solutions? 

Ian KellerThe answers given by Presh and Akhil are all spot one so I wont touch on those… more »
Akhil KumarThat's true that there are many EDR solutions out there, According to me the… more »
Paresh MakwanaMost Important feature is Prevention – First, this means Effectiveness… more »
Rony_Sklar
IT Central Station

Can EDR replace antivirus, or are both needed?

Matthias De ToffolHello EDR can replace a normal AntiVirus and can offer even more, as they can… more »
ShreekumarNairYou can use EDR solutions to track, monitor, and analyze data on endpoints to… more »
Nikki WebbEDR can replace antivirus, if you get the right EDR solution. A solution that… more »