Investigate with Comae

Enterprise memory forensics for threat detection and hunting.

Comae provides you with memory acquisition and analysis capabilities.

We diagnose your machines and assist you in hunting threats or adversaries that are hiding from your traditional security solutions.

Get Started or Request Beta

Benefits

  • Detect cyber-breachers earlier.
  • Reduce time and cost of investigating cyber-incidents.
  • Empower your security team with specialized knowledge.

Easy To Deploy

No pre-installed agent is required. Machine states can be collected via our standalone tool DumpIt and its PowerShell interface to provide your organization more flexibility.

Time Travel Investigation

Stay ahead of adversaries take snapshots and archive your system for retroactive hunting. Unlike log files, if you have a copy of your entire machine’s state you can look for threats and unfamiliar activities by comparing historical records.

Dive Deeper

Endpoint solutions will give you alerts but won't give you the opportunity to look into the core of your machine. Comae Stardust takes you on that deeper dive into to your memory.

Active Threat Intelligence

Our leading internal threat intelligence team continuously monitor new types of attacks and contribute to updating our detection methods.

Blockchain Security

by Comae

The first Ethereum Smart Contracts Decompiler

Download on GitHub

They love Comae

Subscribe for updates