Cyber Triage Logo

Cyber Triage

0
Commercial
Visit Website

Cyber Triage is an automated Digital Forensics and Incident Response (DFIR) software that enables cybersecurity professionals to quickly investigate intrusions related to malware, ransomware, and account takeover. It provides a comprehensive solution for conducting rapid incident response, with features such as artifact scoring, advanced analytics, and a recommendation engine. Cyber Triage is designed to work in various scenarios, including on-premise servers, cloud, and laptops, and is trusted by global organizations committed to security. The software allows responders to quickly answer intrusion questions, such as "What did the attacker do?" and "How did they get in?". It provides a flexible deployment model, with the ability to collect data using an agentless collection tool, analyze artifacts, and respond to incidents. Cyber Triage is built by Sleuth Kit Labs, a spinout of BasisTech, and is designed to make digital forensics easier and more effective for first responders.

FEATURES

ALTERNATIVES

Automated tool for scripting complex sequences in cybersecurity frameworks.

AIL Framework is a modular system for analyzing and detecting information leaks from unstructured data sources, with capabilities for data extraction, correlation, and integration with threat intelligence platforms.

A collection of incident response methodologies for various security incidents, providing easy-to-use operational best practices.

A defense-in-depth security automation and monitoring framework utilizing threat intelligence, machine learning, and serverless technologies.

Dispatch helps manage security incidents by integrating with existing tools and automating incident response tasks.

Malware allows attackers to execute Windows commands from a remote environment

Sample security playbooks for security automation, orchestration and response (SOAR) using Microsoft Sentinel trigger

Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.