Skip to main content
Documents and White-Papers

White-paper (23 May, 2017):   The Need for Proactive Security.  This paper outlines three very important strategies for improving the security posture of your network.  While these methods are not typically traditional, they certainly should be standard additions to the enterprise IT security environment: (1) email cleansing to prevent phishing attacks and malware delivery, (2) alignment of risk management priorities with the next most likely attack vector gained from the external threat hunt, and (3) a fully automated internal threat hunt.

White-paper (26 February, 2017):  Automated Cyber Threat Hunting.  This paper examines the need to perform automated forensic analysis of your network endpoints in order to reduce the breach detection gap from where it currently sits (3-12 months) to mere minutes.  Forensic State Analytics provides the only way to identify malware that has the following properties:  latent (it has not yet begun an attack), zero-day (it has never been seen before), memory-resident (it does not touch the disk drive and therefore will not be seen where traditional systems look).