Digital Forensics & Incident Response
1. Incident Response
What We Do
Primarily we respond to following types of intrusions:
- Rogue activity inside enterprise network or infrastructure
- Theft of data, PII or intellectual property
- Sabotage or destruction
- Insider threats
- Financial crime
We Cover
- Log Anlaysis
- Host Forensics
- Memory Forensics
- Network Forensics
- Malware Analysis
Engagement & Pricing Model
- One-Time Response
- Priced Hourly
- Retainer
- Priced per 50+hour quarterly bucket
2. Compromise Assessment Service
We Cover
- Organization-wide IOC hunting
- Clue-based deep dive
- Network traffic analysis
In the case where a compromise is identified, we have the ability to quickly pivot from compromise assessment to incident response (on customer’s discretion
Engagement & Pricing Model
- One Time Assessment
- Priced on Number of Assets
A thorough assessment whether you got compromised or not?
3. Incident Readiness Drills
What We Do
Test your organization’s defense with a simulated scenario just like a real cyber-attack. We utilize our knowledge of responding to intrusions to create adversary or scenario specific simulations and then run them against your infrastructure to identify gaps and mitigate them before you actually face an incident
Our Belief
“The more you sweat in training, the lesser you bleed in battle !”
Engagement & Pricing Model
Bi-Annual Drills
Priced Per Drill (2 weeks of engagement per drill)
Quarterly Drills
Priced Per Drill (2 weeks of engagement per drill)
Knowledge of your enemy’s offensive capability, determines the strength of your defense
4. Incident Readiness Service
We assess the readiness of your organization against future incidents with a 360-degree perspective of security.
We Assess
Strategic Capability
- Maturity of your incident response plan
- Response procedures, roles and policies
- Maturity of response team and its layers of defense
Operational Capability
- Ability to investigate and respond from a single point
- Ability to investigate at scale
- Level of visibility inside host and network telemetry
Our Belief
“You cannot protect what you don’t know!”
Engagement & Pricing Model
One-Time Assessment
Priced Per Engagement
Add-Ons include
- Assistance in creation of Information Security Policy
- Assistance in creation of Incident Response Plan
- Assistance in creation of Response Playbooks