Augur Resources

Get A demo

Resource Center

Want to know more about SecLytic's Augur PDR, the science behind it, how it’s being used by clients or how it could help protect your organization against cyberthreats? You are in the right place. You’ll find data sheets, Whitepapers, case studies, videos and more. Check back often because we are adding new resources all the time.

Data Sheets

Augur Solution Brief

Augur Solution Brief

What does it do? How does it work? Who is it for? Everything you need to know about SecLytics Augur in two-pages.

Download pdf

Research: Whitepapers

Augur: Real Predictive Threat Intelligence

Augur: Real Predictive Threat Intelligence

Explore how behavioral modeling and machine learning power Augur’s hyper-accurate predictive cyberthreat assessments and improve real-world cyber protection for today’s modern SOC.

Predictive Cyber Threats Targeting Healthcare

Predicting Cyber Threats Targeting Healthcare

With the advent of digital record keeping and big data, healthcare organizations have become a target of preference for cyber criminals because of the high market value of medical PII. Explore how Augur’s predictive threat intelligence provides heightened security for healthcare organizations.

Download pdf
Augur: Real Predictive Threat Intelligence

Augur Predicts and Protects Against Log4JShell

Log4JShell is just one in a series of high-profile, high-impact vulnerabilities affecting IT infrastructure. But SecLytics Augur predicted and protected against it.

Augur: Real Predictive Threat Intelligence

Inference vs. Prediction - Why does it Matter?

Many cybersecurity companies claim to do prediction but in reality they are inferring, not predicting. Find out why that matters.

Augur: Real Predictive Threat Intelligence

Augur Predicts
Infrastructure Use in Mustang Panda Attacks


Case Studies

Predicting Attacks on Energy Vertical

Predicting Attacks on Energy Vertical

In 2019, SecLytics carried out a study with a US-based energy company. Find out how our Augur platform predicted (and blocked) serious imminent attacks.

Download pdf

Tutorial Videos

Move Beyond Information To True Threat Intelligence

SECLYTICS - Forward Deployed | Predictive Defense | Threat AnalyticsSECLYTICS - Accurate | Verifiable | Attack Predictions