Computer Security
Incident Response Team
Recover fast from cyber attacks while keeping reputation impact and damage to a minimum.Once an attack was successful, you certainly need support. Response activities are needed for unauthorized access to infrastructure assets or data, unwanted disruption or denial of service attacks, malware infections, malicious changes to infrastructure, and many more. Our CSIRT services help you recover fast from cyber attacks while keeping reputation impact and damage to a minimum.
Computer forensics
It analyses preserved digital evidence, investigates the chain of custody, assesses hash values, performs drive imaging, and helps you in recovering lost data
Network forensics
It helps you analyse and understand your network traffic, perform deeper looks into the firewall logs, and antivirus/antimalware logs, and looks into the domain controller
Malware forensics
Once a malware has made its effect, a static or dynamic malware analysis should be performed, memory forensics activities should be performed, determine legitimate and illegitimate functionality on the infected asset, and look for Advanced Persistent Threats