We enable security teams to quickly and accurately determine the existence and severity of an advanced targeted attack with threat priority-based mitigation techniques.


Distributed architecture that separates data collection (Cyphort Collector) from analysis (Cyphort Core)

Continuously monitors network traffic off SPAN/TAP ports

Uses behavior analysis for malware detection

Deployed as software running on dedicated hardware or virtual machine