Cyfir CyFIR Enterprise is a revolutionary platform for Incident Response, Internal Investigation, eDiscovery, Threat Assessment, and Threat Hunting.

CyFIR is the ideal network investigation and Incident Response tool for performing live computer investigations across any size enterprise. CyFIR's immense capabilities include the ability to view, acquire, search, and analyze client data within a network without detection or disruption to services using forensically sound methods that preserve evidence. We provide you the ability to leverage this forensic capability simultaneously, in parallel, across every endpoint in your enterprise. This allows organizations to search hundreds of thousands of nodes in the time it takes to search one computer. Any organization’s IT security or digital forensic team can easily use CyFIR to complete a thorough investigation, collect crucial evidence, and produce detailed reports. Our Services: CyTech Services, Inc. is the exclusive provider of CyFIR products and related digital forensic services to the Federal and commercial communities. The services and solutions that CyTech offers are innovative, customized, and focused on the individual needs of our specific clients. What Operating Systems Do We Work On? CyFIR supports Windows 9.x, Windows XP, Windows NT, Windows Vista, Windows 2003, Windows 2008, Windows 7.x, Windows 2011, Windows 2012, Windows 8.x, Linux Kernel 2.4 and above, Windows POS Ready, Embeded Windows, Embedded Linux, Mac OS X 10.x

Mission: MONITOR.REACT. REVIEW. REMEDIATE. //

Collecting forensically-sound information is a critical need for Legal Departments during many proceedings, such as when...
05/13/2019
CyFIR eDiscovery: A Legal Department Use Case

Collecting forensically-sound information is a critical need for Legal Departments during many proceedings, such as when responding to a subpoena, preparing for litigation, or during a merger or acquisition. Learn how CyFIR can help with eDiscovery: https://hubs.ly/H0hNNFr0

CyFIR eDiscovery capabilities help legal departments collect and store enterprise-wide evidentiary data in minutes and hours instead of weeks or months.

Learn about a Chief Information Security Officer's experience during a cyber security breach, which illustrates the powe...
05/08/2019
CyFIR Incident Response: An Information Technology Department Use Case

Learn about a Chief Information Security Officer's experience during a cyber security breach, which illustrates the power of the CyFIR Services to dramatically improve an organization’s Incident Response capabilities. Because #SpeedMatters https://hubs.ly/H0hMgr80

All enterprises, large and small, must safeguard against cyber threats. However, small-cap companies need to both understand the unique challenges they face in risk exposure and develop an appropriate cyber security strategy which can significantly reduce the likelihood, and potential severity, of a...

CyFIR Internal Investigation Services can support Corporate Security needs by safeguarding sensitive materials and provi...
05/07/2019
CyFIR Internal Investigation: A Corporate Security Use Case

CyFIR Internal Investigation Services can support Corporate Security needs by safeguarding sensitive materials and providing insight into an employee’s network activity.

Learn more in this use case: https://hubs.ly/H0hGhGl0 #digitalforensics #speedmatters

CyFIR enables Corporate Security Departments to safeguard intellectual property and guard against theft and other misconduct.

WE'RE HIRING! Apply now to join our team as a Professional Services Program Delivery Manager with tremendous ownership, ...
05/01/2019

WE'RE HIRING! Apply now to join our team as a Professional Services Program Delivery Manager with tremendous ownership, influence, and impact on the products you foster. Ashburn, VA: https://hubs.ly/H0htK7g0

#cybersecurity #jobs

Did you know cyber attacks are the fastest growing crime and predicted to cost the world $6 trillion annually by 2021? h...
04/30/2019

Did you know cyber attacks are the fastest growing crime and predicted to cost the world $6 trillion annually by 2021? https://hubs.ly/H0htJ670

#cybersecurity #digitalforensics #incidentresponse #MDR

We're looking for a Senior Incident Responder Forensic Analyst to join our growing team at the CyFIR HQ in Ashburn, VA. ...
04/24/2019

We're looking for a Senior Incident Responder Forensic Analyst to join our growing team at the CyFIR HQ in Ashburn, VA. Learn more here: https://hubs.ly/H0htGyq0

#tech #jobs #cybersecurity #digitalforensics #incidentresponse #MDR

Have you seen our amazing use-case with IBM? Check out how we use #IBMi2 to gather and fuse information telemetry data f...
04/23/2019
CyFIR, LLC

Have you seen our amazing use-case with IBM? Check out how we use #IBMi2 to gather and fuse information telemetry data from endpoints for forensic incident response.

“We can almost instantly get an overview of machines talking to each other,” says Irvine. “We can feed that information into i2, along with the other data i2 pulls in, giving an analyst a tremendous overview of network activities.” https://hubs.ly/H0hwBy00

CyFIR worked with IBM to integrate the capabilities of IBM® Resilient Incident Response Platform®, IBM BigFix® and IBM i2® Enterprise Insight Analysis technology with the CyFIR platform. The result? A comprehensive threat detection and remediation platform that can help customers drastically red...

Did you know a recent study shows security technologies with threat intelligence capabilities, like CyFIR, provide compa...
04/18/2019
Security technologies that provide the most savings

Did you know a recent study shows security technologies with threat intelligence capabilities, like CyFIR, provide companies the most savings? https://hubs.ly/H0hv0mr0

#cybersecurity #digitalforensics #incidentresponse

A new report from Accenture and the Ponemon Institute quantifies which cybersecurity technologies provide the most value to an organization.

We're hiring a Solutions and Implementation Engineer to work with our team in Ashburn, VA. Apply now to join our growing...
04/17/2019

We're hiring a Solutions and Implementation Engineer to work with our team in Ashburn, VA. Apply now to join our growing team: https://hubs.ly/H0htz-70 #jobs #cybersecurity

Learn how we worked with IBM to create a comprehensive threat detection and remediation platform that can help customers...
04/04/2019

Learn how we worked with IBM to create a comprehensive threat detection and remediation platform that can help customers drastically reduce the costs associated with a security incident. https://www.ibm.com/case-studies/cyfir

#cybersecurity #incidentresponse #digitalforensicssoftware

Join our growing team as we pursue our vision to make rapid, remote digital forensics and incident response accessible, ...
04/04/2019

Join our growing team as we pursue our vision to make rapid, remote digital forensics and incident response accessible, usable, and valuable to all businesses to improve their resiliency to cyberattack. Apply here to join our team in Manassas #VA: https://hubs.ly/H0hhJrw0

#jobs #cybersecurity #incidentresponse #digitalforensicssoftware #tech

09/07/2016
House Oversight and Government Reform Committee Releases Comprehensive Report Confirming CyFIR Software Located and Identified Malware in OPM Data Breach

The House Oversight and Government Reform Committee confirms CyTech's extensive involvement in detecting, investigating and assisting in the remediation of the OPM breach. What a complete validation of our CyFIR technology and people! http://www.prnewswire.com/news-releases/house-oversight-and-government-reform-committee-releases-comprehensive-report-confirming-cyfir-software-located-and-identified-malware-in-opm-data-breach-300324014.html?tc=eml_cleartime

WASHINGTON, Sept. 7, 2016 /PRNewswire/ -- Majority members of the House Oversight and Government Reform...

What do you do when your primary firewall is breached?  Step 1.  Control the panic and patch the Firewall Immediately  S...
12/20/2015
Secret Code Found in Juniper’s Firewalls Shows Risk of Government Backdoors

What do you do when your primary firewall is breached? Step 1. Control the panic and patch the Firewall Immediately Step 2. Determine if you have zero day malware on your endpoints. CyFIR can do this in minutes. Step 3. Protect your endpoint's process execution space with a real time detection and response capability like CyFIR. Contact us at http://www.cyfir.com/contact-us to learn more. 4. Validate all users and accounts.

Suspicious code found in Juniper's firewall software underscores why governments shouldn't be allowed to install their own backdoors in software.

Hmmmmm, makes you wonder about their public statements if they won't go on the record........
11/21/2015
U.S. Federal Agencies Refuse to Testify About OPM Hack

Hmmmmm, makes you wonder about their public statements if they won't go on the record........

Officials from the U.S. government's personnel agency unexpectedly refused on Tuesday to attend a closed-door congressional briefing on their handling of a massive computer breach that affected more than 22 million federal workers.

If DQ would really like to know if their networks are breached, CyFIR is the perfect tool to do so.  CyFIR has the abili...
08/27/2014
DQ Breach? HQ Says No, But Would it Know? — Krebs on Security

If DQ would really like to know if their networks are breached, CyFIR is the perfect tool to do so. CyFIR has the ability to scan/search and entire network in the same time that it takes to scan/search just one computer and our professional services are experts at identifying and remediating malware/breaches. www.cyfir.com

Sources in the financial industry say they’re seeing signs that Dairy Queen may be the latest retail chain to be victimized by cybercrooks bent on stealing credit and debit card data. Dairy Queen says it has no indication of a card breach at any of its thousands of locations, but the company also ac…

CyFIR was the first enterprise forensic and incident response tool that supported Windows Point of Sale terminals.  Shou...
08/19/2014
Albertson's stores hacked for credit card data

CyFIR was the first enterprise forensic and incident response tool that supported Windows Point of Sale terminals. Should have used CyFIR!

Albertson's and SuperValu become the latest companies to experience a data breach of its debit and credit card data.

CyFIR, with it's ability to search every single endpoint in an environment in the same amount of time it takes to search...
08/19/2014
Hospital network hacked, 4.5 million records stolen

CyFIR, with it's ability to search every single endpoint in an environment in the same amount of time it takes to search one computer, is invaluable in both the pre-breach and post-breach investigation and remediation efforts. Typically if you have CyFIR as part of your investigative tool set, you have investigated and remediated the problem by the time the company mentioned in this article is able to arrive on the scene. www.cyfir.com

Hackers have taken 4.5 million Social Security numbers from patients who attended any one of Community Health Systems' 206 hospitals this year.

As the realm of cyber expands, CyFIR has the ability to protect the Internet of Things (IoT).  CyFIR currently supports ...
07/29/2014
IoT Security the New Solution Vertical, Drives Faster Adoption of M2M

As the realm of cyber expands, CyFIR has the ability to protect the Internet of Things (IoT). CyFIR currently supports Windows Embedded, Linux Embedded, Mac OSX, and the Windows OS devices.......

According to Context Information Security, a provider of technical security consultancy, the M2M connection also comes with security requirements that need to be put in place to ensure that the connections remain safe and information from the connected devices that is carried via the network is not…

CyFIR is a big part of the cyber protection strategies for retailers.  As the first cyber forensics enterprise tool to w...
07/24/2014
Security Challenges: How Can Retailers Protect Themselves?

CyFIR is a big part of the cyber protection strategies for retailers. As the first cyber forensics enterprise tool to work on point of sale terminals, CyFIR brings state of the art continual monitoring, detection, incident response and forensics at the speed that enterprises demand to the retail environment.

While the rise of e-commerce and cloud data storage have proven to be a boon for consumers, a host of cyber security challenges have emerged for retailers.

07/24/2014

CyTech Services provides professional services and computer forensic/incident response analysis solutions serving the needs of both private and public sector customers. Members of CyTech’s senior leadership, management, and design teams are all senior digital forensic examiners and incident responders themselves, with decades of experience supporting Intelligence, Law Enforcement, Military, and Commercial clients. For years we were using the industry leading cyber and forensic tools on the market in our client engagements, but those tool were failing to keep up with the scale of the enterprises that we were walking into and the speed with which we needed to be responsive to our clients. About two years ago we decided to make our own tool that would meet these needs. The result was CyTech Forensic and Incident Response (CyFIR). CyFIR Enterprise is a comprehensive network forensic investigation tool that provides cutting edge, deployable forensic solutions at both the size of tomorrow's enterprises and the speed necessary to resolve very complex incidents in a matter of hours/minutes not days/weeks/months. CyFIR Enterprise is the ideal network investigation and Incident Response tool for performing live computer investigations across any size enterprise. CyFIR Enterprise has immense capabilities including the ability to view, acquire, search, and analyze client data within a network without causing a disruption to end-point or network services or other business operations, but our critical capability is to deliver all of this forensic forensic fidelity in parallel through distributed processing throughout your entire network. Essentially in the time that it takes to search one computer, we can search your entire network or subsets of your network (hundreds of thousands of computers). CyFIR is made by practitioners for practitioners, tackling the hard problems that we are facing in the cyber and the enterprise forensics battlefield. If you are interested we would love to provide you a demo and/or speak further about CyTech and CyFIR.

Chinese Hackers Pursue Key Data on U.S. Workers
07/10/2014
Chinese Hackers Pursue Key Data on U.S. Workers

Chinese Hackers Pursue Key Data on U.S. Workers

It is not yet clear how far the hackers penetrated the systems of the Office of Personnel Management, in which applicants for security clearances list their personal information.

Timeline Photos
07/02/2014

Timeline Photos

CyFIR has the ability to alert on and capture unencrypted endpoint traffic that is connected to an external host via an ...
07/02/2014
Warning Signs Corporate Computers Could be Talking to Cloud-based Malware

CyFIR has the ability to alert on and capture unencrypted endpoint traffic that is connected to an external host via an encrypted tunnel..... www.cyfir.com

http://www.computerworld.in/news/warning-signs-corporate-computers-could-be-talking-to-cloud-based-malware

The recent discovery of command-and-control software sending instructions to malware-infected computers from Dropbox raises the question of how such threats can be discovered.

Address

20130 Lakeview Center Plaza, Suite 120
Ashburn, VA
20147

Opening Hours

Monday 08:00 - 17:00
Tuesday 08:00 - 17:00
Wednesday 08:00 - 17:00
Thursday 08:00 - 17:00
Friday 08:00 - 17:00
Saturday 09:00 - 17:00
Sunday 06:00 - 22:00

Telephone

(703) 936-4170

Alerts

Be the first to know and let us send you an email when Cyfir posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Cyfir:

Nearby businesses


Other Ashburn businesses

Show All