In order to give you a better service Airbus uses cookies. By continuing to browse the site you are agreeing to our use of cookies. I agree

Respond

Products and Services Overview

Cyber On-Demand

Discover More

Incident Response

Discover More

Forensic Assessment

Discover More

Penetration Testing

Discover More

Cyber On-Demand

Flexible threat assessment & security incident management

Manage cyber threats thanks to our advanced expertise delivered in service mode.

We cover five main areas:
Advanced Mass Forensics
• Reverse engineering
Penetration Test
Incident Response
• Consulting, from threat intelligence reports to Active Directory audit, and from awareness sessions to on-site demonstrations

Customer Benefits

  • High reactivity thanks to a unique flexible framework contract
  • Qualified experts and CSIRT (Computer Security Incident Response Team) support covering an exhaustive scope and tailored to your needs answering your specific needs
  • Transversal support in case of a proven security incident with the activation of a dedicated crisis team

Incident Response

24/7 global support through all stages of the incident response process

Ensure the protection of your most sensitive infrastructures and data with our incident response service.

We support you at each step of an Incident Response: detection, containment, reconstruction and crisis management, while respecting your operational constraints.

Our solution offers you a service of distant investigation and qualification of your incidents and an immediate reactivity. We offer you an international 24/7 service of containment and then restoration of systems by our European teams of experts CSIRT.

We also help you once the crisis is under control to rehabilitate and improve the protection in place, with the development of a tailor-made strategy.

Customer Benefits

  • 24/7 availability of Airbus CyberSecurity teams
  • Engagement of your teams: Training of your employees by Airbus CyberSecurity
  • Optimized investment through a more flexible contractual relationship

Forensic Assessment

High-grade and automated digital forensics

During a classic computer Forensic capture and investigation, our experts concentrate their analysis on disks, logs, network and mobiles.

In case of Incident Response or legal procedure, our team supports you during the different phases.
• Processing and analysis of information on digital media provided by customer
• Analysis of the timeline of the events on customers infrastructure to detect signs of compromising
• Restoration of the events history in accordance with legal requirements

After remediation and restoration, our complementary services will take along to help you increasing your security.

Customer Benefits

  • • Establish incident root cause using advanced investigation techniques during the incident response phases, while maintaining the digital chain of evidence.
  • Detect the signs of compromise through automated investigation.

Penetration Testing

Assess the technical protection of your critical assets

Preparation and execution of technical audits and high-grade custom penetration tests in accordance with your environment and needs.

Our expertise is focus on SCADA infrastructure pen testing, APT threat simulation, and defence assistance.

We offer three possibilities of penetration testing :

  • Black-box: the auditors will not be given any knowledge about the audited asset or group of assets so as to place themselves in the position of a malicious third-party
  • Grey box: the auditors will be given the knowledge of a legitimate user (e.g. valid credentials) so as to place themselves in the position of a malicious user or a third-party that could get this information through a first successful attack
  • White box: to fully assess the risks of escalation and propagation, the auditors will be given all the knowledge they need (e.g. source codes and configurations) so as to place themselves in the position of a malicious third-party or user that has already compromised part or the entire asset or group of assets


  • The audited asset, or group of assets, can include one or more of the following:

  • Hardened system
  • Private network
  • Public address
  • Web, mobile and native application
  • Contactless access control systems
  • PMR infrastructure
  • Customer Benefits

    • Ensure your business assets are protected in line with your security policy.
    • Identify the potential vulnerabilities and understand the risks involved.