Reduce the risks with a
Wide range investigation campaigns
A successful investigation campaign depends on the completeness of artefacts explored.
Analysis of known-attacks markers
We primarily look for known-attacks thanks to the IOC and Yara rules integrated in our knowledge base.
Collection of unknown-attacks traces
We identify unlisted threats by analyzing the persistence methods of programs.
NO SECURITY BREACH
Our cyber-diagnosis enhances your risks analysis.
Thanks to the information collected, we thoroughly map the information system. This overview allows us to identify and evaluate potential risks.
CONFIRMED SECURITY BREACH!
Do not panick.
Our experts extend their intervention on demand in order to respond to the incident and neutralize the threat.
Qualification of the attack
By reconstructing the actions of hackers, we evaluate the extent of the attack,
- Scope of the compromise
- Presence or absence of a malware
- Means of persistence in the system
Our incident reports offer you recommendations to harden your system.