Features of Intersec’s Compromise Assessment Services
As a part of our data breach retainer service, compromise assessment services can be conducted on an ongoing basis. Never have your paid retainer go to waste. By including this service along with your other retained services, you will receive real value for the money spent.
Intersec’s compromise assessment includes:
Deploying Inspection Technology
Our monitoring technology audits internet access points, servers, workstations, and remote devices such as laptops and smartphones.
Leveraging Prior Investigation Intelligence
In many circumstances, host-based artifacts and network traffic signatures identified in past attacks can be used as indicators of a current digital attack.
Assessing for Abnormalities
By assessing your host and network traffic, abnormalities in the environment that suggest evidence of attacker activity can be identified.
Analyzing Evidence
Using a wide range of tools, including real-time forensic analysis, the assembled evidence is analyzed and recommendations are compiled.
Summarizing Findings
The Compromise Report not only identifies any security breaches, but also summarizes any recommended remediation actions to be taken.