The Only Digital Forensics Tool Specialized For Incident Response

Complete intrusion investigations with speed, accuracy, and simplicity

The New Way to Investigate Intrusions

Cyber Triage is automated Digital Forensics and Incident Response (DFIR) software that allows cybersecurity professionals like you to quickly answer intrusion questions related to:

It uses host-based data, scoring, advanced analytics, and a recommendation engine to ensure your investigations are fast and comprehensive.

Cyber Triage- Digital Forensics Tool- recommend Engine

The Leader in DFIR Artifact Scoring

Cyber Triage is the only DFIR tool that will:

  • Score artifacts to ensure you quickly focus on relevant data
  • Scan executables with 40+ malware detection engines
  • Deploy in challenging environments where agents can’t be used
  • Recommend artifacts to ensure you follow up on all leads

SOCs, MSSPs, consultants, and law enforcement all use these features to answer their hard investigative questions, such as “What did the attacker do?” and “How did they get in?”.

Download Now

Complete Your Investigations Faster

Speed is critical to ensure you get the evidence before it is overwritten and you minimize the damage an attacker can do.

Cyber Triage maximizes the artifacts per second you process by:

  • Identifying the artifacts that are relevant and showing them first.
  • Recommending artifacts so that you quickly follow all leads.
  • Integrating with SIEMs so that collections start ASAP.

View Benefits

Faster Diagram - Digital Forensics Tool & Incident Response Software- Cyber Triage

Comprehensive Diagram Digital Forensics Tool & Incident Response Software Cyber Triage

Conduct More Comprehensive Investigations

Investigations need to be comprehensive to understand the full scope of the incident and remove the persistence mechanisms.

Cyber Triage gives you breadth by:

  • Collecting dozens of artifact types based on numerous attack scenarios.
  • Analyzing executables with 40+ malware scanning engines.
  • Using threat intelligence to update collection methods and heuristics.

View Benefits

Flexible Deployments

Investigations using Cyber Triage have four basic steps:

  1. Data is collected using an agentless collection tool that sends artifacts over the network, to USB, or S3.
  2. Artifacts are analyzed and scored using threat intelligence. Correlations are made between hosts.
  3. Responders review the artifacts and dive deeper based on what questions they need to answer.
  4. Additional hosts are collected from and added to the incident.

Cyber Triage has been designed to work in any scenario a Cyber First Responder finds themselves in. It can run on a laptop, the cloud, or an on-premise server.

See How it Works

Cyber Triage Digital Forensics Tool Collection Methods

Who Created Cyber Triage?

Cyber Triage was created by the same digital forensic developers at Basis Tech who were responsible for Autopsy and The Sleuth Kit.

Basis Tech believes in making the jobs of those on the front lines easier by making software that is automated and easy to use.

The company understands that it can’t decrease first responders’ responsibilities, but it can make digital forensics as easy and effective as possible.

Trusted by global organizations committed to security
GoPuff customer Logo- Cyber Triage
Cyber Triage Client-InfoForense
Cyber Triage Client-Secorvo

What Could Happen
If You Don’t Get Cyber Triage?

Cyber attacks are on the rise, and the likelihood of your company experiencing an attack is high. According to Microsoft, each data breach costs an average company $3.8 million.

Not having Cyber Triage could mean intruders stay in your network longer, accessing valuable data and inflicting damage.

To limit the damage and ensure the effectiveness of your investigations, get Cyber Triage today.

Start Your Free Trial

Try It Today

Download an evaluation copy and use Cyber Triage on your own data (or our data set) for 7-days.

Free.  No credit card required. 

Start Your Free Trial

Learn How to Answer Intrusion Questions

Intrusion investigations are amongst the most difficult for digital forensic investigators because there are so many types of evidence to look for.

Our Divide and Conquer DFIR Process helps investigators answer these hard questions by breaking them into smaller questions.

Learn more in our 3-hour course.
Cyber Triage was built on these concepts.

Sign Up