Mantix4’s innovative threat hunting changes the rules of asymmetrical warfare, employing white hat deception (ex: honeypots) while exposing and eliminating threat actors in your network before they detonate. Finally, proactive threat-hunting that does not rely on signature or rule-based detection mechanisms.

Hypothesis-driven
This type of hunt begins with an initial hypothesis or question; for example, could or have we been affected by a specific threat actor campaign, with an exploratory investigation based on known TTPs and related security intelligence?
IOC-driven
Known indicators of compromise are used to initiate the investigation and used to search security data for their (or associated IOC’s) presence.
Analytics driven
Advanced analytics, machine learning and other capabilities are used to assist the analyst to identify the most promising areas to begin hunting.