Compromise Assessment
What is it?
In most cases, post cyber-incident investigations reveal that evidence of potential attack exisited prior to the incident taking place. With a more proactive approach to cyber security, organisations can ensure vulnerabilities and indicators of compromise are discovered early to prevent future incidents.
This is where our service comes in. Compromise Assessment Provides a comprehensive forensic analysis or an organisations cybersecurity posture by providing:
Full Asset Discovery
Detection of cyber Threats/indicators of compromise
Analysis of flaws in IT and cyber security operations
Technical evidence of compliance measures and deviations that need to be corrected
Why should you use it?
Compromise Assessment is suitable for anyone who is looking to take a more proactive approach with their cyber strategy.
While organisations are likely to already have a cyber security strategy in place (SIEM, Vulnerability Assessment, Pen-Testing, Anti-Virus) these are not always 100% effective . Compromise Assessment is complimentary to existing cyber security solutions and aims to detect threats that may have not been picked up by them. This allows for remediation measures to be implemented quickly before these gaps are identified and exploited by attackers.
While other assessment methods can take weeks to produce results, we use a unique combination of Artifical intelligence (AI), Machine Learning(ML) and top level analysts to get results to you in days.
How does it work?
Firstly, our artefact collector module collects all available log data from the Windows servers and devices on the network. The data is then double encrypted before being uploaded to the analytics engine.
Once uploaded to the analytics engine, using a combination of Al & ML algorithms, the log data is analysed against our database of proprietary cyber threat models in order to identify any vulnerabilities that exist on the network.
Finally our expert Cyber analysts check over the data and findings to provide context to the report
Once the analysis is completed, our engine generates a final Compromise Assessment report which can be mapped to industry standards such as CIS etc. The final report will provide an in-depth understanding of your infrastructure by showing:
Has a compromise taken place or what the likelihood for this to happen is
Weak areas or practices which need to be addressed
Behavioural analysis and context behind findings
Recommended next steps for remediation
How much will this cost?
The assessment scope (which systems, locations, methods, etc) is dictated by the client so our pricing starts at £1995.