Hunt

Endgame Named Finalist for Endpoint Security and Advanced Persistent Threat Detection & Response in the Info Security PG's 2017 Global Excellence Awards®

Recognition based on platform's ability to prevent, detect, and hunt advanced threats before damage and loss

December 06, 2016
How to Hunt: Finding the Delta
blog-author-image
Posted By:
Categories :

Identifying outliers or anomalous behavior depends heavily on a robust and credible understanding of those baseline characteristics within a network. Normal behavior and attributes vary significantly and are unique to each environment. Any efforts to structure the baseline may include essential factors such as temporal and geographic considerations, number of users, file types, approved applications, and so forth.

October 31, 2016
How to Hunt: The Masquerade Ball
blog-author-image
Posted By:
Categories :

Digital masquerading is used by the most sophisticated as well as less skilled adversaries to hide in the noise while conducting operations. We continue our how to hunt series with an exploration of masquerading.

Endgame Leaves Attackers Nowhere to Hide: Expands Detection Features for In-Memory Attacks and Malicious Persistence

Platform Anticipates Latest Attacker Innovations to Offer the Earliest Endpoint Detection and Response Solution in the Market

October 05, 2016
How to Hunt: The [File] Path Less Traveled
blog-author-image
Posted By:
Categories :

This piece addresses another branch of the persistence framework and illustrates the efficacy of hunting for uncommon file paths.

September 28, 2016
Hunting for Exploit Kits
blog-author-image
Posted By:
Categories :

Introducing Maxwell, an automated exploit kit collection and detection tool that crawls the web hunting for exploits.

September 14, 2016
How to Hunt: Detecting Persistence & Evasion with the COM
blog-author-image
Posted By:
Categories :

After adversaries breach a system, they usually consider how they will maintain uninterrupted access through events such as system restarts.

August 14, 2016
Endpoint Malware Detection for the Hunt: Real-world Considerations

In this post, we'll address operationalizing a malware classifier on an endpoint in the context of a hunt paradigm.

Accenture And Endgame Create Joint Cyber Service Product

Accenture [ACN] and Endgame, Inc. have created a joint threat hunting as-a-Service offering for clients to help identify and carefully remove cyber adversaries who evade traditional security methods.

Accenture and Endgame Announce Managed Hunting Service to Help Organizations Kill Cybersecurity Threats in Real-time

Operated by security specialists, rapidly deployable solution detects and evicts adversaries

NEW YORK, Aug. 1, 2016 -- Accenture (NYSE: ACN) and Endgame Inc., a leading provider of security solutions designed to proactively evict adversaries, have created a threat hunting as-a-Service offering for clients. Powered by Endgame and operated by Accenture senior cybersecurity hunters, the powerful service stealthily helps to identify and surgically remove known and never before seen adversaries that have evaded traditional security methods.

Pages