Cyber Triage makes your investigations more efficient using automated scoring and recommendations. If you are a SOC analyst, consultant, or law enforcement officer, Cyber Triage will maximize the artifacts per second that you process and ensure you get the attackers out quickly.
Collect Comprehensive Evidence
Cyber Triage’s collection tool focuses on the artifacts needed for intrusion investigations. It saves time by making copies of only the important data from the live system, disk image, or memory image.
It is regularly updated based on attack trends and can be deployed from the Cyber Triage server, EDR, or USB.
Score Artifacts to Detect Threats
Cyber Triage analyzes the artifacts and assigns a score based on how likely they are to be from an intrusion. This makes the investigation faster because you can focus on the bad and suspicious items and ignore the thousands of irrelevant ones.
The scoring methods are updated regularly based on attack trends and threat intelligence. It includes coverage from 40+ malware scanning engines.
Recommend Additional Artifacts
As you dig deeper to identify root cause, Cyber Triage will recommend related artifacts. For example, calling out that a network connection came from a process that had a triggered task.
Cyber Triage helps you get to the root cause with a timeline of the system, a view of the folder structure, and the ability to pivot between artifact types.
Collaborate Within The Team
Collaboration and integration are critical to fast responses. During the investigation, Cyber Triage allows multiple investigators to work on the same incident and pull in data from past cases to determine relevance. At the end, you can generate a report to distribute.
At any time, Cyber Triage can integrate with SIEM and SOAR systems to start collections or export results.
See it in Action
This review by SANS instructor and YouTuber Richard Davis (13Cubed) provides a complete overview of Cyber Triage, focusing on memory forensics and the Volatility integration.
Trusted by global organizations committed to security
“I recommend because it's easier to access, analyze and ensure complete threat assessment making it fast to solve an incident.”
“I highly recommend this software to detect new network alerts and investigate end points as well as determine severity and scope.”
“User friendly solution that saves time because it is agentless, fully automated and focused on triage principles. Doesn't require middle man to process information returned by the utility, as all is processed in real time and reports generated."
“I like that it is easy to understand and does not need forensic experts to decode the issues in end point devices, also it is agentless which removes the hassle of installing a piece of code on end user systems.”
Internal IR / SOC Teams
Whether your organization has a team of people dedicated to incident response or a single do-it-all security professional, you need to be able to quickly, comprehensively, and easily investigate, remediate, and report on threats.
Cyber Triage’s automated collection, scoring, artifact correlation, and easy reporting allows cyber first responders to quickly come to conclusions and communicate them to management. Cyber Triage collects intrusion data from every relevant location compares it against past incidents and global threat intelligence, ensuring comprehensive investigations. Designed to make everything about incident response straightforward, even green thumbs can create a data-based story of an incident.
Consultants / MSSPs
Incident response consultants have hard jobs.
You need to identify and scope an incident quickly, yet you lack visibility into the company’s network and systems. To respond effectively, you must learn what is normal in an unfamiliar environment, using easily deployed infrastructure to quickly evaluate and prioritize potentially compromised systems.
Cyber Triage’s non-persistent agent offers endpoint visibility with bring-your-own infrastructure. Even when you don’t have this information upfront, Cyber Triage helps you contextualize evidence, and its automated collection and analysis processes help you quickly evaluate the situation and prioritize the investigation. And, because it’s licensed per responder (not per endpoint), it scales across any size organization.
Law enforcement officials have unique challenges when dealing with intrusions.
You need to identify the cause of an intrusion while maintaining the court admissibility of the evidence. And they need to work with investigators who are not focused solely on cyber threats.
Many incident response tools were designed for corporate enterprises and assume that users have a live computer and can use software agents. Cyber Triage is uniquely designed for law enforcement-use cases because it is built on digital forensics tools that are used in courts, is agentless, and can analyze disk images. And its intuitive interface makes it easy for non-cyber specialists to review results.