Blog Contact Us Support InQuest LinkedIn InQuest Twitter
InQuest logo
  • Overview
    Dropdown Icon

    Overview

    What is FDR?

    Get a bird's eye view of FDR drivers, differences between it and other detection and response solutions, uniqueness, and who can benefit from its power.

    Technology

    Gain an understanding of FDR's foundational technologies - including Deep File InspectionTM and RetroHuntingTM - which work in concert to stop file-borne attacks.

    • High-Performance Network Capture
    • Deep File Inspection (DFI)
    • TI Acquisition and Curation
    • IQ Score
    • Intelligent Orchestration
    • RetroHunting
    Core Features

    Learn how FDR features speak directly to the SOC work of data acquisition, inspection, analysis, action, and threat hunting.

    • Acquisition
    • Inspect
    • Analyze
    • Score
    • Act
    • Hunt
    Benefits

    See how FDR closes the user security gap - which delivers substantial business, security personnel, and SOC ROI benefits.

    Differentiation

    Understand how FDR is fundamentally different from other detection and response (and prevention) solutions.

    What is FDR?

    Content Separator

    Close the end-user security gap by stopping file-borne breaches and incidents stemming from malware, ransomware, exploits, phishing lures, scams, fraud and data loss violations.

    Read more Read More Arrow Icon

    Technology

    Content Separator
    • High-Performance Network Capture
    • Deep File Inspection (DFI)
    • TI Acquisition and Curation
    • IQ Score
    • Intelligent Orchestration
    • RetroHunting

    Core Features

    Content Separator
    • Acquisition
    • Inspect
    • Analyze
    • Score
    • Act
    • Hunt

    Benefits

    Content Separator

    FDR provides value that flows straight to your bottom: avoids costs associated with file-borne malware, ransomware, exploits, phishing lures, scams, fraud, and data loss breaches and incidents; saves massive amounts of time for stretched SOC analysts and threat hunters; and reduces cybersecurity upfront and operating costs, and drives up the efficacy and value of your adjacent security solutions.

    Read more Read More Arrow Icon

    Differentiation

    Content Separator

    We are long on detection, response - and intelligence-driven prevention. And while EDR, NDR and XDR are worthy solutions for what they address, a quick review of FDR core technologies and features will show they are not us, and we are not them. This summary page will give you a quick synopsis of how FDR is different.

    Read more Read More Arrow Icon
  • Solutions
    Dropdown Icon

    Solutions

    Solutions

    Every organization - whether public or private sector - has a set of modern security concerns. See the security solutions where FDR most excels.

    • Solutions Overview

    • Integrated Cloud Email Security
    • Web Security
    • Network Threat Analytics
    • Threat Prevention
    • Data Loss Prevention
    • Breach Detection
    • Threat Hunting
    • Threat Intelligence
    • Security Orchestration, Automation and Response (SOAR)
    File-borne Attack Use Cases

    Compelling examples of how FDR stops zero-days, n-days, data loss violations, breaches and more.

    • Zero-Day Attack Coverage
    • N-Day Attack Coverage
    • Machine Learning Assisted Threat Prevention
    • Data Loss Prevention (DLP)
    • Breach Detection
    • Support for the Consumption of Numerous Data, File and Protocol Formats
    Threat Hunting Use Cases

    Examples of how FDR automates the exhausting work of converting raw data to decision-making insights.

    • Threat Hunting & RetroHunting
    • Identify Malware Through Automated Dissection and Inspection
    • Import YARA Signatures
    • Threat Actor Infrastructure Detection & Tracking
    SOC ROI Use Cases

    Learn how FDR easily integrates with your existing defense-in-depth solutions.

    • Data Acquisition and Delivery
    • ICAP Integration
    • SIEM Integration
    • Multitenancy Support
    • Sandbox Integration for Dynamic File Analysis
    • MultiAV Integration for Malware Detection

    Solutions

    Content Separator
    • Solutions Overview

    • Integrated Cloud Email Security
    • Web Security
    • Network Threat Analytics
    • Threat Prevention
    • Data Loss Prevention
    • Breach Detection
    • Threat Hunting
    • Threat Intelligence
    • Security Orchestration, Automation and Response (SOAR)

    File-borne Attack Use Cases

    Content Separator
    • Zero-Day Attack Coverage
    • N-Day Attack Coverage
    • Machine Learning Assisted Threat Prevention
    • Data Loss Prevention (DLP)
    • Breach Detection
    • Support for the Consumption of Numerous Data, File and Protocol Formats

    Threat Hunting Use Cases

    Content Separator
    • Threat Hunting & RetroHunting
    • Identify Malware Through Automated Dissection and Inspection
    • Import YARA Signatures
    • Threat Actor Infrastructure Detection & Tracking

    SOC ROI Use Cases

    Content Separator
    • Data Acquisition and Delivery
    • ICAP Integration
    • SIEM Integration
    • Multitenancy Support
    • Sandbox Integration for Dynamic File Analysis
    • MultiAV Integration for Malware Detection
  • Products & Services
    Dropdown Icon

    Products & Services

    Products

    Our product offerings address threat intel, email security, web security, and network threat analytics. Conveniently packaged to address specific and comprehensive file-borne attack challenges.

    • FDR Email Security SaaS
    • FDR Web Security SaaS
    • FDR API SaaS
    • FDR Network Threat Analytics
    • FDR Total Security
    Services

    For organizations who prefer to take advantage of our in-house expertise and experience, FDR is available as an InQuest service. As well, we offer training and tailored intelligence services.

    • FDR Threat Intelligence
    • FDR Training
    • InQuest Email Attack Simulation
    Pricing

    Ready to take advantage of FDR? See our straightforward pricing table which allows you to start where you like and grow as you need.

    Products

    Content Separator
    • FDR Email Security SaaS
    • FDR Web Security SaaS
    • FDR API SaaS
    • FDR Network Threat Analytics
    • FDR Total Security

    Services

    Content Separator
    • FDR Threat Intelligence
    • FDR Training
    • InQuest Email Attack Simulation

    Pricing

    Content Separator

    Files are ever present in your email, web and network traffic. We'll always advocate for a holistic approach with FDR Total Security. But our products and services are conveniently packaged to give you the flexibility of starting where you like and growing as you need.

    Read more Read More Arrow Icon
  • Resources
    Dropdown Icon

    Resources

    Blog

    Visit our blog to get informative insights on the latest malware samples, threat intel, threat actors tools and more.

    InQuest Labs

    Ever fresh samples dissected with Deep File Inspection, reputation and IOC findings as well as tooling for YARA rules and more.

    Newsletter

    Stay up-to-date in cybersecurity with our monthly synopsis of key blog posts, email security harvesting, InQuest™ Labs Research Spotlights, global security events and more.

    White Papers

    View our white papers for more in-depth coverage of FDR’s core technologies and key features.

    ROI Calculators

    Leverage our models to see just how much time and expense would be required for SOC personnel to do what FDR performs automatically.

    Case Study

    The City of Danville case study.

    Blog
    Content Separator

    Our blog is chock full of valuable insights into the latest threats, how-to's, feature explanations and other useful information about FDR. We don't write fluff. It's a blog worthy of analyst, threat hunter, SecOps and CISOs who want to stay in-the-know.

    Read more Read More Arrow Icon
    InQuest Labs
    Content Separator
    • InQuest Labs
    • Downloads
    • Trystero Mail Provider Comparison
    Newsletter
    Content Separator

    We package a month's worth of top blogs, email security assessment stats, InQuest Lab’s spotlights, and upcoming event notices into a quick read that will keep you informed with minimal time investment.

    Read more Read More Arrow Icon
    Case Study
    Content Separator

    The InQuest Integrated Cloud Email Security (ICES) platform and automated threat hunting feature used at City of Danville.

    Read more Read More Arrow Icon
    White papers
    Content Separator
    • DFI and Retrohunting
    • InQuest Machine Learning
    • Data-loss Discovery
    Further reading Read More Arrow Icon
    ROI Calculators
    Content Separator
    • Threat Hunting Depth
    • False Positive Response
    • Email Admin Time
    • Email User Time
    • Return on Security Investment (ROSI)
    • Blog: Calculating Return-on-Investment
    Content
    Content Separator

    Products

    • NDR
    • ICES
    • Web SaaS

    Solutions

    • Threat Prevention
    • Breach Detection
    • Data Loss

    Technologies

    • Deep File Inspection (DFI)
    • DFI Analytical Pipeline
    • RetroHunting
    • Retrohunting as a Service
    • Threat Intelligence
    • Intelligent Orchestration

    Case Studies

    • The City of Danville Case Study
  • Company
    Dropdown Icon

    Company

    About

    Learn more about InQuest and it's origins.

    Leadership

    Information about InQuest's founders and advisory board.

    Press Releases

    Recent and past InQuest-related news archive.

    Events

    Events that InQuest is excited to lend our experience.

    Careers

    Career opportunities at InQuest.

    Support

    Information about our 24x7x365 support.

    Partners

    Information about InQuest's industry partners.

    Privacy Policy

    This website's privacy policy.

    Testimonials

    Read what our customers have to say about us.

    About us
    Content Separator

    InQuest provides a network-based security solution for data-in-motion and data-at-rest, on-prem or in the cloud. With expertise in intrusion prevention, detection, and monitoring, the platform has been in use since 2010 in public sector and corporate environments.

    Read more Read More Arrow Icon
    Leadership
    Content Separator

    This webpage describes the leaders, founders, and advisors of the company, highlighting their backgrounds and expertise in the field of information security.

    Read more Read More Arrow Icon
    Press Releases
    Content Separator

    This webpage provides information about the company's press releases, offering insights and updates on its products, services, and recent developments.

    Read more Read More Arrow Icon
    Events
    Content Separator

    The webpage showcases the events InQuest is participating in, including trade shows, conferences, and webinars, offering opportunities for attendees to learn more about the company's products and services.

    Read more Read More Arrow Icon
    Careers
    Content Separator

    This webpage lists career opportunities available at InQuest, offering a chance for job seekers to join a team focused on providing innovative solutions in the field of information security.

    Read more Read More Arrow Icon
    Support
    Content Separator

    The webpage details InQuest's 365x24x7 support, providing information on the company's commitment to ensuring reliable and efficient assistance to customers around the clock.

    Read more Read More Arrow Icon
    Partners
    Content Separator

    This webpage provides information on InQuest's industry partners, highlighting the strategic alliances and collaborations that support the company's mission to deliver effective information security solutions.

    Read more Read More Arrow Icon
    Privacy Policy
    Content Separator

    This webpage includes information about the website's privacy policy, outlining how user data is collected, processed, and protected, ensuring a secure and trustworthy user experience.

    Read more Read More Arrow Icon
    Testimonials
    Content Separator

    Details about InQuest's customer testimonials, offering insight into the experiences and successes of the company's clients and their satisfaction with its products and services.

    Read more Read More Arrow Icon

remcos

July 2020

IQ-FA008:Remcos Maldoc Utilizing Macrosheets
Site Map
  • Overview
  • High-Performance Network Capture
  • Deep File Inspection (DFI)
  • TI Acquisition and Curation
  • RetroHunting
  • Intelligent Orchestration
  • IQ Score
  • FDR Email Security SaaS
  • FDR Web Security SaaS
  • FDR API SaaS
  • FDR Network Threat Analytics
  • FDR Total Security
  • Services
  • Blog
  • Why InQuest
Miscellaneous
  • InQuest Labs
  • Curated Gallery of Malware Lures
  • ROI Calculators
  • Email Attack Simulation
  • Email Hygiene Analysis
  • #FreeIntel
  • Careers
  • Trystero
  • Data Sheet
  • Privacy Policy
  • Sitemap
Latest Tweets
Tweets by InQuest
Contact
  • Phone Icon Phone
    +1 (866) 982-0561
  • Website / URL Icon Support web
    support.inquest.net
  • Envelope / Mail / Contact Icon Support
    support@inquest.net
  • Envelope / Mail / Contact Icon Sales
    sales@inquest.net
  • PGP Key Icon PGP Key
    inquest.pgp
Schedule a Demo
Inquest, LLC
2403 East 16th Street Studio Q
Austin, Texas 78702
USA
Copyright ©
This website stores cookies on your computer. These cookies are used to improve the usability of this website and provide more personalized experience for you, both on this website and through other websites. To find out more, see our Privacy Policy.
Accept