Blog

InQuest Celebrates 10-year Anniversary Preventing File-borne Attacks 

It’s been ten years since InQuest opened it’s virtual doors back in 2013. Built for the most targeted computing environment on the planet, the Pentagon, our mission has been to empower private and public sectors to identify, detect, and prevent advanced malware, ransomware, phishing, scam and fraud attacks, breaches, and data loss incidents. 

We’ve spent nearly two decades defending the Department of Defense on a global scale. With a relentless commitment to staying ahead of the curve, we continuously explore, examine, and validate our technologies to ensure only the highest level of security for our clients. 

Over time, our security philosophy has remained both defensive and offensive. From our time defending national security interests while leading the Pentagon’s Computer Incident Response Team (PENTCIRT), we have developed skill and appreciation for the strength of a strong defensive stance. Equally, our experience spearheading Tippingpoint’s Zero Day Initiative (ZDI) and iDefense’s Vulnerability Contributor Program (VCP) has given us valuable insights into and respect for the power of cultivating a strong offensive position.  

Special edition InQuest 10th Anniversary Battle Coins

With our industry-leading Deep File Inspection® (DFI) technology, we continue to stop file-borne breaches and incidents, automate threat hunting with real-time intelligence, and force multiply SOC and SecOps across the globe. Never straying from our mission, we are proud of the progress we have made and the clients, industry leaders, and partners we have met along the way. We have continued to stop file-borne breaches and incidents, automate threat hunting with real-time intelligence, and force multiply SOC and SecOps across the globe.

Today, our team is comprised of seasoned professionals with hands-on expertise in intrusion prevention, detection, analysis, and monitoring. We continue to work to build and support the cybersecurity community as a whole by contributing to the cybersecurity conversation via talks, publications, open-source software, and researcher collaboration.

We look forward to the next decade of providing the highest level of service to our customers and partners. 

How Effective Is Your Email Security Stack?

Did you know, 80% of malware is delivered via email? How well do your defenses stand up to today’s emerging malware? Discover how effectively your email provider’s security performs with our Email Attack Simulation. You’ll receive daily reports on threats that bypassed your defenses as well as recommendations for closing the gap. Free of charge for 30 days.