Sift Security’s next generation security operations platform supercharges threat hunting and incident response. Sift’s scalable graph database correlates high volumes of diverse data sources, removing the manual burden from your team. Novel artificial intelligence identifies and prioritizes critical risks. And our intuitive threat hunting interface, workflow and automation reduces response times.
Sift Security’s Cloud Hunter allows Security and DevOps teams to more easily monitor and investigate their Cloud infrastructure. Cloud Hunter ingests cloud logs such as VPC Flow and Cloud Trail from AWS, maps the logs into our graph database, analyzes and alerts when known risks and anomalous behavior are identified, enables rapid visual investigations, and seamless action through API integrations with other products. The cloud logs can be combined with endpoint or application logs to provide comprehensive visibility and support end-to-end investigations. Our early adopter customers are completing investigations in minutes, that previously took days using enterprise search technologies.