www.comae.com Open in urlscan Pro
2600:9000:20ae:f400:16:9c8:7b40:93a1  Public Scan

URL: https://www.comae.com/dumpit/
Submission: On May 29 via manual from RU — Scanned from DE

Form analysis 1 forms found in the DOM

Name: mc-embedded-subscribe-formPOST https://comae.us13.list-manage.com/subscribe/post?u=3df905c2d1e8ab7bfc318395f&id=640eec6596

<form action="https://comae.us13.list-manage.com/subscribe/post?u=3df905c2d1e8ab7bfc318395f&amp;id=640eec6596" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate="">
  <input type="email" value="" name="EMAIL" class="email" id="mce-EMAIL" placeholder="email address" required="">
  <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_3df905c2d1e8ab7bfc318395f_640eec6596" tabindex="-1" value=""></div>
  <input type="submit" value="SUBSCRIBE" name="subscribe" id="mc-embedded-subscribe" class="button round">
</form>

Text Content

ENRICH YOUR DATA
WITH COMAE

A Memory Focused Investigation Platform providing unique data-enrichment and
query capabilities.
They love Comae



DIAGNOSES CYBER ATTACKS
THROUGH MEMORY

 * Detect
   cyber-breaches earlier
 * Reduce
   time and cost of investigating cyber-incidents
 * Empower
   your security team with specialized knowledge


 * EASY TO DEPLOY
   
   No pre-installed agent is required. Machine states can be collected via our
   standalone tool DumpIt and its PowerShell interface to provide your
   organization more flexibility.


 * TIME TRAVEL INVESTIGATION
   
   Stay ahead of adversaries, take snapshots and archive your system for
   retroactive hunting. Unlike log files, if you have a copy of your entire
   machine’s state you can look for threats and unfamiliar activities by
   comparing historical records.


 * DIVE DEEPER
   
   Endpoint solutions will give you alerts but won’t give you the opportunity to
   look into the core of your machine. Comae Stardust takes you on that deeper
   dive into your systems.


 * ACTIVE THREAT INTELLIGENCE
   
   Our leading internal threat intelligence team continuously monitors new types
   of attacks and contributes to updating our detection methods.


THEY TALK ABOUT US

Previous

Next
 * 1
 * 2
 * 3
 * 4
 * 5
 * 6
 * 7
 * 8
 * 9
 * 10


Support
 * Blog
 * Press
 * Knowledge base
 * Github repository


SUBSCRIBE TO OUR NEWSLETTER


hello@comae.com
+971 523 140 685
© 2020 Comae. All rights reserved.