Automation for the Cyber First Responder
Cyber Triage makes your response more efficient when you are working around the clock to get attackers out.
It has 4 core concepts to make you as fast and comprehensive as possible:
- Collect the relevant artifacts from live running Windows systems and send results to a server, S3 bucket, or USB drive.
- Prioritize the artifacts using a variety of scoring techniques and algorithms to identify those that are associated with an intrusion.
- Recommend additional artifacts based on what the user tags.
- Collaborate with your team about your findings and share your results.
Cyber Triage’s flexibility allows it to integrate with SIEM/SOAR systems, leverage cloud infrastructure, and be used by both internal SOCs and MSSPs.
Cyber Triage allows you to more efficiently find attackers and get them out.
Cyber Triage users include
Maximize Your Artifacts Per Second
The key to getting attackers out is being able to quickly process lots of data from lots of hosts. This allows you to identify where they are and how they persist.
Cyber Triage allows you to achieve both speed and comprehensiveness:
- Speed: Artifact scoring allows you to quickly focus on the small set of artifacts that are relevant. Don’t waste your time on normal activity.
- Comprehensive: Thousands of artifacts are collected to look for malware and account takeovers. The recommendation engine makes sure you know about related items.
Cyber Triage’s automation makes you as fast as possible. In the words of 13Cubed, “It’s almost to the point of point and click forensics.”
Malware Scanning Engines
Collect Complete Evidence
Cyber Triage’s targeted collection approach saves time because it copies the most important data from the system in one step and does not require the user to make a forensic image of the entire drive.
Find Threats Fast
After collection, Cyber Triage automatically looks for data that is anomalous and similar to past incidents. Each collected item is assigned a score based on its risk. Bad and suspicious items are prioritized and shown to the user.
After reviewing the data, users can dig deeper for more context and get to root cause. Cyber Triage recommends related files, provides timelines to find other suspicious items, and makes it easy to pivot between artifacts.
Everything works together with Cyber Triage. Multiple investigators can work on the same investigation at the same time. JSON or CSV reports are easy to generate and import into other systems. (It’s also simple to create beautiful HTML reports for management). And, once the investigation is done, Cyber Triage uses the results to improve future analyses.
Internal IR Teams
Whether your organization has a team of people dedicated to incident response or a single do-it-all security professional, you need to be able to quickly, comprehensively, and easily investigate, remediate, and report on threats.
Cyber Triage’s automated collection, scoring, artifact correlation, and easy reporting allows cyber first responders to quickly come to conclusions and communicate them to management. Cyber Triage collects intrusion data from every relevant location compares it against past incidents and global threat intelligence, ensuring comprehensive investigations. Designed to make everything about incident response straightforward, even green thumbs can create a data-based story of an incident.
Incident response consultants have hard jobs.
You need to identify and scope an incident quickly, yet you lack visibility into the company’s network and systems. To respond effectively, you must learn what is normal in an unfamiliar environment, using easily deployed infrastructure to quickly evaluate and prioritize potentially compromised systems.
Cyber Triage’s non-persistent agent offers endpoint visibility with bring-your-own infrastructure. Even when you don’t have this information upfront, Cyber Triage helps you contextualize evidence, and its automated collection and analysis processes help you quickly evaluate the situation and prioritize the investigation. And, because it’s licensed per responder (not per endpoint), it scales across any size organization.
Law enforcement officials have unique challenges when dealing with intrusions.
You need to identify the cause of an intrusion while maintaining the court admissibility of the evidence. And they need to work with investigators who are not focused solely on cyber threats.
Many incident response tools were designed for corporate enterprises and assume that users have a live computer and can use software agents. Cyber Triage is uniquely designed for law enforcement-use cases because it is built on digital forensics tools that are used in courts, is agentless, and can analyze disk images. And its intuitive interface makes it easy for non-cyber specialists to review results.
Watch It In Action
This review by SANS instructor and YouTuber Richard Davis (13Cubed) provides a complete overview of Cyber Triage, focusing on memory forensics and the Volatility integration.
What others say
“I recommend because it's easier to access, analyze and ensure complete threat assessment making it fast to solve an incident.”
“I highly recommend this software to detect new network alerts and investigate end points as well as determine severity and scope.”
“User friendly solution that saves time because it is agentless, fully automated and focused on triage principles. Doesn't require middle man to process information returned by the utility, as all is processed in real time and reports generated."
“I like that it is easy to understand and does not need forensic experts to decode the issues in end point devices, also it is agentless which removes the hassle of installing a piece of code on end user systems.”