Augur Resources

Get A demo

Resource Center

Want to know more about SecLytic's Augur PDR, the science behind it, how it’s being used by clients or how it could help protect your organization against cyberthreats? You are in the right place. You’ll find data sheets, Whitepapers, case studies, videos and more. Check back often because we are adding new resources all the time.

Data Sheets

Augur Solution Brief

Augur Solution Brief

What does it do? How does it work? Who is it for? Everything you need to know about SecLytics Augur in two-pages.

Download pdf

Research: Whitepapers

Augur: Real Predictive Threat Intelligence

Augur: Real Predictive Threat Intelligence

Explore how behavioral modeling and machine learning power Augur’s hyper-accurate predictive cyberthreat assessments and improve real-world cyber protection for today’s modern SOC.

Augur: Real Predictive Threat Intelligence

Augur Predicts and Protects Against Log4JShell

Log4JShell is just one in a series of high-profile, high-impact vulnerabilities affecting IT infrastructure. But SecLytics Augur predicted and protected against it.

Augur: Real Predictive Threat Intelligence

Augur Predicts
Infrastructure Use in Mustang Panda Attacks

Tutorial Videos

Move Beyond Information To True Threat Intelligence

SECLYTICS - Forward Deployed | Predictive Defense | Threat AnalyticsSECLYTICS - Accurate | Verifiable | Attack Predictions