compromise assessment
TRANSCRIPT
© 2020 Secure D Consulting Sdn Bhd | https://secure-d.tech | [email protected]
YOUR SECURE DAEMON
COMPROMISE
ASSESSMENT
© 2020 Secure D Consulting Sdn Bhd | https://secure-d.tech | [email protected]
COMPROMISE ASSESSMENT
2
Service Description
The Need for Compromise Assessment
Over an agreed upon time period, our team of experienced incident responders and threat
analysts will carry out a proactive investigation and assessment on the environment to
detect, analyze, and respond to threats. Our approach is designed to rapidly identify if the
environment is compromised or not compromised. Flexible and scalable, our compromise
assessment is designed to compliment small to large and complex network environment.
The team leverages on our agentless VEIOR and NEST a threat intelligence engine by
Secure D, to correlate and monitor for indicators of compromise (IoC), indicators of attack
(IoA) and performs in-depth analysis to validate attacks. Upon confirmation of breach or
active threats, you will receive guidance on containment methods and impact mitigation.
With cyber-attacks becoming increasingly sophisticated, reported data breaches and intrusion activities in the news represent only a fraction of known reported incidents. Threats remain active in your environment, undetected for significant amount of time before being discovered. By then, damage has been done.
Knowing if your environment has been breached and identifying ways to contain and reduce risks are crucial in preventing your organization from becoming the next major data breach headline.
Secure D’s Compromise Assessment is a complete review of your organization’s network
environment that:
• Rapidly identifies active and past security threats within your organization
• Identifies weaknesses, vulnerabilities and misconfigurations
• Increases the organization’s capability to detect, respond and contain future incidents
• Compliments the traditional vulnerability assessment and penetration testing activities
Uncover the unknown threats in your
environment. Respond effectively.
© 2020 Secure D Consulting Sdn Bhd | https://secure-d.tech | [email protected]
3
• Execution of
agentless
collector
Deploy Hunt Analyze Report
• Recommendations
and remediations
based on findings
• Sweeping through
collected data for
IoCs and IoAs
• Activating incident
response process
upon breach
detection
• Analysis and
threat profiling
• Identify
existing gaps
within the
environment
Benefits
Threat detection and response
Rapid detection and response
capabilities. Identifying past and
active threats from further
compromising the environment.
Environment Insights
Presenting insights on the risks and
exposures within the environment,
stopping potential threats before
occurring.
Reduced dwell time
Reducing dwell time and the cost of
a breach.
Recommendations
Providing recommendations and
remediation methods on gaps,
findings and way forward.
Our Approach Our approach, along with our extensive experience in responding to intrusions and utilizing
our technology to deliver the assessment that meets your desired business objectives with
speed, scalability and efficiency.
NEST
VEIOR
A threat intelligence
engine designed by
Secure D to assist in
rapid identification.
VEIOR will collect and
organize data which will
be fed to NEST for
processing.
COMPROMISE ASSESSMENT
Use Cases
• Incident Response & Forensics
• Threat Hunting
• Systems and IT Migration
• Mergers & Acquisition
• Regulatory & Compliance