Active Countermeasures News & Events
- Mon31Dec2018Oakland, CA
Active Countermeasures is proud to be named CIO Applications Top 10 Companies Providing Enterprise Security Solution - 2018. Our COO, Chris Brenton, is featured in the article Threat Hunting: Delivered Right Out of the Box
We are proud to announce that we have released major updates to both RITA, our open source product, and AI-Hunter, our commercial offering. RITA is now up to v2.0.0-beta1 and AI-Hunter is up to v2.1.0. We have made some huge performance improvements in this release! AI-Hunter is now orders of magnitude faster and can handle much larger datasets. We’ve also reorganized the UI to make analysis much easier. You can find more info in the release announcement posted here.
We are proud to be awarded by Enterprise Security Magazine as Top 10 Security Analytics Solution Providers of 2018! Chris Brenton was interviewed for an article about threat hunting that you can read here.
The focus of this release is simplifying the threat hunting process. As of this release, AI-Hunter takes the first pass at threat hunting the network for you. We identify which characteristics could be indicators of a compromise, and assign a “threat score” from zero to 100 to each of your hosts. You can find more info in the release announcement posted here.
- Thu25Oct2018Deadwood, SD
The primary focus of this release was speed and scalability. You should notice that screens run faster and AI-Hunter can process even larger datasets and whitelists. We’ve also reduced the size of the install file by a bit over 25%. We’ve also added a new module called “useragent”. This allows you to quickly identify unique user agents on your network, which may be an indication of systems running unexpected software. The most interesting user agents will automatically show up at the top of the list. You can find more info in the release announcement posted here.
- Tue25Sep2018Las Vegas, NV
Join Chris Brenton, COO of Active Countermeasures, as he discusses the anatomy of beacons and why you need to be looking for them during a threat hunt. He also talks through the challenges of detecting beacons, and some tricks you can use. Watch the Webcast here.
In this release we focused on reducing the time it takes to perform a successful threat hunt. You’ll notice a lot of tweaks that are designed to minimize the need to jump to other tools to collect evidence. We also have a new deep dive module which is one stop shopping to review all suspect activity associated with a specific internal IP address. You can find more info in the release announcement posted here.
- Wed08Aug2018Las Vegas, NV