COMPROMISE ASSESSMENT

3
© 2020 Secure D Consulting Sdn Bhd | https://secure-d.tech | [email protected] YOUR SECURE DAEMON COMPROMISE ASSESSMENT

Transcript of COMPROMISE ASSESSMENT

© 2020 Secure D Consulting Sdn Bhd | https://secure-d.tech | [email protected]

YOUR SECURE DAEMON

COMPROMISE

ASSESSMENT

© 2020 Secure D Consulting Sdn Bhd | https://secure-d.tech | [email protected]

COMPROMISE ASSESSMENT

2

Service Description

The Need for Compromise Assessment

Over an agreed upon time period, our team of experienced incident responders and threat

analysts will carry out a proactive investigation and assessment on the environment to

detect, analyze, and respond to threats. Our approach is designed to rapidly identify if the

environment is compromised or not compromised. Flexible and scalable, our compromise

assessment is designed to compliment small to large and complex network environment.

The team leverages on our agentless VEIOR and NEST a threat intelligence engine by

Secure D, to correlate and monitor for indicators of compromise (IoC), indicators of attack

(IoA) and performs in-depth analysis to validate attacks. Upon confirmation of breach or

active threats, you will receive guidance on containment methods and impact mitigation.

With cyber-attacks becoming increasingly sophisticated, reported data breaches and intrusion activities in the news represent only a fraction of known reported incidents. Threats remain active in your environment, undetected for significant amount of time before being discovered. By then, damage has been done.

Knowing if your environment has been breached and identifying ways to contain and reduce risks are crucial in preventing your organization from becoming the next major data breach headline.

Secure D’s Compromise Assessment is a complete review of your organization’s network

environment that:

• Rapidly identifies active and past security threats within your organization

• Identifies weaknesses, vulnerabilities and misconfigurations

• Increases the organization’s capability to detect, respond and contain future incidents

• Compliments the traditional vulnerability assessment and penetration testing activities

Uncover the unknown threats in your

environment. Respond effectively.

© 2020 Secure D Consulting Sdn Bhd | https://secure-d.tech | [email protected]

3

• Execution of

agentless

collector

Deploy Hunt Analyze Report

• Recommendations

and remediations

based on findings

• Sweeping through

collected data for

IoCs and IoAs

• Activating incident

response process

upon breach

detection

• Analysis and

threat profiling

• Identify

existing gaps

within the

environment

Benefits

Threat detection and response

Rapid detection and response

capabilities. Identifying past and

active threats from further

compromising the environment.

Environment Insights

Presenting insights on the risks and

exposures within the environment,

stopping potential threats before

occurring.

Reduced dwell time

Reducing dwell time and the cost of

a breach.

Recommendations

Providing recommendations and

remediation methods on gaps,

findings and way forward.

Our Approach Our approach, along with our extensive experience in responding to intrusions and utilizing

our technology to deliver the assessment that meets your desired business objectives with

speed, scalability and efficiency.

NEST

VEIOR

A threat intelligence

engine designed by

Secure D to assist in

rapid identification.

VEIOR will collect and

organize data which will

be fed to NEST for

processing.

COMPROMISE ASSESSMENT

Use Cases

• Incident Response & Forensics

• Threat Hunting

• Systems and IT Migration

• Mergers & Acquisition

• Regulatory & Compliance