Skip to content
Veteran-Owned. Built by engineers who've actually done the work.
★ Veteran-Owned · SDVOSB-Eligible Built by federal-trained detection engineers

Detection is the easy part.
Proving it is the product.

Every alert in your environment runs through a structured reasoning pipeline that interrogates the evidence, tests opposing hypotheses, and produces a forensic record a detection engineer signs off before any action is taken. The output is not a notification. It is the record your auditor, your insurance carrier, and your lawyer can read.

Built by
DHS · CISA · NIH · Google Mandiant
Federal-trained detection engineers. Veteran owned.
Priced at
$15 / endpoint / month
Published. No sales-call gating. 25 endpoint minimum.
Backed by
$250,000 breach warranty
Underwritten by Cysurance on every Fortress plan.
Scroll
0+
Custom detection rules
mapped to MITRE ATT&CK
0
Evidence questions
per investigation, on average
0/7
Continuous monitoring
with human-approved verdicts
0%
Verdicts signed
by a federal-trained engineer

Method

Chapter 01The PICERL framework

Six phases between an event and an evidence chain.

Every Carbynix engagement runs the SANS PICERL incident response framework end to end. The same six-phase methodology federal IR teams use, the standard your insurance carrier and your auditor already recognize.

Phase 01 · Preparation

Visibility is the foundation.

Endpoint sensors deployed, full process and script-block telemetry enabled, baselines established. A custom detection library of more than 1,100 rules mapped to MITRE ATT&CK. Without this layer, everything downstream is guessing.

Phase 02 · Identification

Every alert, interrogated.

Alerts fire on suspicious activity across endpoints, cloud, and identity. Every alert is interrogated by a structured AI reasoning pipeline. Hundreds of evidence questions. Counterfactual hypotheses ruled out before any verdict is reached.

Phase 03 · Containment

Human-approved isolation.

Verified threats trigger human-approved isolation: endpoint quarantine, account disable, network segmentation. No autopilot. No black box. The reasoning chain that justified the action is preserved with the action — auditable, reviewable, defensible.

Phase 04 · Eradication

Removed at forensic depth.

Forensic-depth removal of persistence mechanisms, malicious artifacts, and attacker footholds. Forensic-grade artifact collection ensures the host returns to a known-good state, not a re-infectable one.

Phase 05 · Recovery

Back online, evidence chain intact.

Coordinated restoration of business operations. Cleanliness validated before reconnection. Heightened monitoring tuned for re-entry attempts. The business is back online with the evidence chain intact.

Phase 06 · Lessons Learned

The artifact your auditor reads.

The full investigation record — every phase from preparation through recovery — is preserved as a forensic artifact. The format your auditor, your lawyer, and your insurance carrier can read. The difference between an alert log and an evidence chain.

Proof

Chapter 02What an investigation looks like

Most MDR vendors show you marketing slides. We show you the work.

A representative excerpt from a Carbynix investigation record. The actual artifact your team receives, your auditor reads, and your insurer reviews if a claim is ever filed.

Investigation ID  2026-04-23-71F4
Closed · Benign
LSASS Memory Access by Non-Standard Process
Rule
124102 / Credential Access Precursor
Process
powershell.exe (PID 4120)
Target
lsass.exe (PID 612)
Access
PROCESS_VM_READ, PROCESS_QUERY_INFORMATION
Host
WS-PARTNER-04 / Windows 11 Pro 23H2
Is this an interactive PowerShell session?
No. Scheduled task. Parent: svchost.exe via Task Scheduler.
Is the executing script signed?
Yes. Valid Authenticode signature. Publisher: Microsoft Corporation.
Did the session establish outbound network connections?
No. Zero outbound traffic in the 60 second post-execution window.
Does the access pattern match known credential-harvesting tools?
No. Read length 4096 bytes, single read. Mimikatz signature reads exceed 2MB across multiple memory offsets.
Counterfactual
Could this be a legitimate Defender scheduled scan?
Yes. MsMpEng.exe and Defender update jobs perform similar reads. Cross-reference confirms scheduled AV scan window 02:00 to 04:00 UTC. Event timestamp 02:14:08 UTC falls inside window.
Verdict
Benign. Microsoft Defender scheduled scan, signature update routine.
Verified by
M. Patel, Detection Engineer
Time to verdict
4 minutes 12 seconds
Record retained
365 days · available in client portal

Every investigation Carbynix runs produces a record like this one. The reasoning is preserved, the verifying engineer is named, and the artifact is retained for as long as your compliance regime requires. It is the evidence chain commodity MDR cannot produce, because commodity MDR was never designed to be evidence in the first place.

Verticals

Chapter 03Who we work with

Built for the businesses regulators expect more from.

Every Fortress engagement ships documentation mapped to your industry's specific regulatory regime — not generic compliance. The artifacts your auditor signs.

▸ Feature · Federal SDVOSB

Federal & Defense.

SAM.gov-registered, SDVOSB-eligible, CMMC-aligned. We support DoD primes and federal contractors with detection programs that satisfy NIST 800-171 controls and DFARS 7012 reporting timelines. Veteran-owned end-to-end — built by engineers who've stood post.

  • SAMSAM.gov registered
  • CMMCAligned to Levels 1–3
  • NIST800-171 / DFARS 7012
  • VAVets First eligible
Federal capabilities
ABA Model Rule 1.6 · Formal Opinion 477R / 483

Law Firms

Reasonable-efforts documentation under Model Rule 1.6 plus client-matter segregation and the audit trail Opinion 483 expects after an incident.

GLBA · FTC Safeguards · NYDFS 500

Financial Services

Annual board attestations, vendor oversight logs, and the 36-hour breach reporting workflow your regulator already knows.

IRS WISP · FTC Safeguards · Pub. 4557

CPA Practices

Quarterly attestation, encryption-at-rest proof, access-controls audit. WISP maintained current to IRS guidance.

CMMC · NIST 800-171 · ITAR / EAR

Manufacturing & Defense

CUI handling, supply-chain monitoring, and the controlled-unclassified-information audit trail DoD primes look for.

HIPAA Security Rule · HITECH · PHI

Healthcare

Technical safeguards documentation, audit-log retention, BAA-ready architecture. Per-violation exposure $137–$2.1M.

NAIC Model 668 · PA PIDSA · State DOI

Insurance Agencies

Annual commissioner certification artifacts, third-party service-provider oversight log, producer-license-review readiness.

SOC 2 Type II · GDPR · Customer DPAs

SaaS & Technology

Continuous-controls evidence, sub-processor monitoring, and the customer-DPA breach clauses your enterprise prospects diligence on.

Outside Counsel Guidelines · Client SLAs

Consulting & Advisory

Client-driven security posture meeting OCG requirements, with the breach-notification and forensic-engagement language enterprise clients expect.

04 / Engagements

Three ways to engage. One platform underneath.

The same detection engine, the same reasoning pipeline, the same engineers. The tier you pick changes scope and documentation, not capability.

Guardian
$15 / endpoint / month
Core managed detection and 24/7 human-verified response. The right service for businesses that have outgrown antivirus and want real coverage at a transparent price. 25 endpoint minimum. No upper ceiling. Annual commitment discounts available.
Fortress
$22 / endpoint / month · $250K Warranty
Everything in Guardian, plus the evidence layer. Quarterly compliance attestation mapped to your industry, 10 hours per month of incident response retainer, 365 day log retention, and a $250,000 breach warranty backed by Cysurance. The tier built for regulated practice.
Aegis
Custom Engagement
Multi-site enterprise and federal-eligible engagements. Direct access to the engineers who built the platform. Custom SLA, SAML/SSO, dedicated detection engineering, vertical-specific rule development. SDVOSB federal set-aside eligible. No help-desk tier.
05 / The Warranty
$250K
Breach Warranty · Backed by Cysurance

This is what we are willing to put behind the methodology.

Every Fortress subscription includes a $250,000 breach warranty, underwritten by Cysurance. It is the kind of commitment a detection program can only make when the methodology produces evidence, not opinion, and when a human engineer signs every verdict before action is taken.

Fortress Detail →
START THE CONVERSATION

Clear answers begin with a focused discussion.

Whether you are responding to an active incident, seeking clarity through forensic investigation, or looking to strengthen your security posture, Carbynix is ready to help. Reach out to begin a confidential conversation and determine the right next steps for your organization.

CONTACT US