www.comae.com
Open in
urlscan Pro
2600:9000:20ae:f400:16:9c8:7b40:93a1
Public Scan
URL:
https://www.comae.com/dumpit/
Submission: On May 29 via manual from RU — Scanned from DE
Submission: On May 29 via manual from RU — Scanned from DE
Form analysis
1 forms found in the DOMName: mc-embedded-subscribe-form — POST https://comae.us13.list-manage.com/subscribe/post?u=3df905c2d1e8ab7bfc318395f&id=640eec6596
<form action="https://comae.us13.list-manage.com/subscribe/post?u=3df905c2d1e8ab7bfc318395f&id=640eec6596" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate="">
<input type="email" value="" name="EMAIL" class="email" id="mce-EMAIL" placeholder="email address" required="">
<div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_3df905c2d1e8ab7bfc318395f_640eec6596" tabindex="-1" value=""></div>
<input type="submit" value="SUBSCRIBE" name="subscribe" id="mc-embedded-subscribe" class="button round">
</form>
Text Content
ENRICH YOUR DATA WITH COMAE A Memory Focused Investigation Platform providing unique data-enrichment and query capabilities. They love Comae DIAGNOSES CYBER ATTACKS THROUGH MEMORY * Detect cyber-breaches earlier * Reduce time and cost of investigating cyber-incidents * Empower your security team with specialized knowledge * EASY TO DEPLOY No pre-installed agent is required. Machine states can be collected via our standalone tool DumpIt and its PowerShell interface to provide your organization more flexibility. * TIME TRAVEL INVESTIGATION Stay ahead of adversaries, take snapshots and archive your system for retroactive hunting. Unlike log files, if you have a copy of your entire machine’s state you can look for threats and unfamiliar activities by comparing historical records. * DIVE DEEPER Endpoint solutions will give you alerts but won’t give you the opportunity to look into the core of your machine. Comae Stardust takes you on that deeper dive into your systems. * ACTIVE THREAT INTELLIGENCE Our leading internal threat intelligence team continuously monitors new types of attacks and contributes to updating our detection methods. THEY TALK ABOUT US Previous Next * 1 * 2 * 3 * 4 * 5 * 6 * 7 * 8 * 9 * 10 Support * Blog * Press * Knowledge base * Github repository SUBSCRIBE TO OUR NEWSLETTER hello@comae.com +971 523 140 685 © 2020 Comae. All rights reserved.