Flexible threat assessment & security incident management
Manage cyber threats thanks to our advanced expertise delivered in service mode.
We cover five main areas:
• Advanced Mass Forensics
• Reverse engineering
• Penetration Test
• Incident Response
• Consulting, from threat intelligence reports to Active Directory audit, and from awareness sessions to on-site demonstrations
24/7 global support through all stages of the incident response process
Ensure the protection of your most sensitive infrastructures and data with our incident response service.
We support you at each step of an Incident Response: detection, containment, reconstruction and crisis management, while respecting your operational constraints.
Our solution offers you a service of distant investigation and qualification of your incidents and an immediate reactivity. We offer you an international 24/7 service of containment and then restoration of systems by our European teams of experts CSIRT.
We also help you once the crisis is under control to rehabilitate and improve the protection in place, with the development of a tailor-made strategy.
High-grade and automated digital forensics
During a classic computer Forensic capture and investigation, our experts concentrate their analysis on disks, logs, network and mobiles.
In case of Incident Response or legal procedure, our team supports you during the different phases.
• Processing and analysis of information on digital media provided by customer
• Analysis of the timeline of the events on customers infrastructure to detect signs of compromising
• Restoration of the events history in accordance with legal requirements
After remediation and restoration, our complementary services will take along to help you increasing your security.
Assess the technical protection of your critical assets
Preparation and execution of technical audits and high-grade custom penetration tests in accordance with your environment and needs.
Our expertise is focus on SCADA infrastructure pen testing, APT threat simulation, and defence assistance.
We offer three possibilities of penetration testing :
The audited asset, or group of assets, can include one or more of the following: