About service

We determine the presence or absence of infrastructure compromise by retrospectively searching for corresponding indicators and other signs of malicious activity.

We provide a detailed report upon completion of the work that includes:

•  The company's threat landscape
•  A complete list of hypotheses which will be used for the search for tactics, techniques, and procedures of a potential attacker
•  Results of the analysis of collected data, as well as the monitoring telemetry from the workstations and servers where EDR agents were installed
•  If any suspicious or malicious activity is detected – an investigation report that contains reconstructed incident timeline
•  Recommendations for the infrastructure hardening and improving the incident response readiness that contains remediation and mitigation recommendations

Best solution if

1

You have recently had an incident and need confirmation of the localization and elimination of the threat.

2

You are changing a contractor or working with multiple contractors and need to audit your network or the network of a contracting organization.

3

A merger with another organization is forthcoming.

4

The company and its network infrastructure is significantly geographically distributed, which complicates proper control.

5

It is necessary to check the infrastructure for traces of advanced threats that do not reveal themselves through active actions in the network.

We offer:

We propose: • Collection of forensically significant data from endpoints and their retrospective analysis • Organization of real-time device monitoring using EDR during the work period • Collection and retrospective analysis of network interaction data • Analysis of system logs • Analysis of logs from perimeter application systems • Identification of external assets, including shadow infrastructure • Search for data leaks in surface, deep and dark web segments of the Internet • Search for websites/domains using the company's brand attributes • Monitoring social media and messaging platforms for accounts/posts using brand attributes • Monitoring the publication of sensitive information on recruitment platforms or in the media

Try it out

Let’s talk how to improve the security and efficiency of your IT and cyber security systems.