Threat Hunting

CipherTechs can use existing tools such as Splunk, ELK, Graylog, OSQuery, Carbon Black, and search for indicators of compromise across an organization. Hunt objectives can be targeted or broad based on the situation at hand. If existing tools are not in place, CipherTechs can deploy free open-source tools to rapidly hunt in urgent situations. This service is ideal for companies that suspect they have been compromised, or want to do periodic third-party hunts to look for malicious activity.