Services

Services

Contact

Services

Email Compromise

Email Compromise

Email log collection, parsing, and detailed forensic analysis. Perform analysis on user mailboxes and deliver tenant-wide health checks.

Email log collection, parsing, and detailed forensic analysis. Perform analysis on user mailboxes and deliver tenant-wide health checks.

Ransomware

Ransomware

Contain encryption fast, trace entry & lateral movement, eradicate persistence, and manage the incident end-to-end.

Contain encryption fast, trace entry & lateral movement, eradicate persistence, and manage the incident end-to-end.

Network Intrusion

Network Intrusion

Investigate breaches, including APT campaigns, by mapping attacker activity across endpoints, network traffic, and cloud logs.

Investigate breaches, including APT campaigns, by mapping attacker activity across endpoints, network traffic, and cloud logs.

Data Theft

Data Theft

Trace all exfiltration paths and identify the exact data at risk of exposure.

Trace all exfiltration paths and identify the exact data at risk of exposure.

Insider Threat

Insider Threat

Carry out workstation and mobile device forensic analysis, to build a timeline of anomalous user activity.

Carry out workstation and mobile device forensic analysis, to build a timeline of anomalous user activity.

Compromise Assessment

Compromise Assessment

Proactive sweep of endpoints and logs to uncover any indicators of compromise.

Proactive sweep of endpoints and logs to uncover any indicators of compromise.

IR Retainer


IR Retainer


Annual subscription for consulting services to strengthen security, and have our team on standby in the event of a breach.

Annual subscription for consulting services to strengthen security, and have our team on standby in the event of a breach.

Tabletop Exercise

Tabletop Exercise

Breach simulations that pressure-test incident response plans and playbooks.

Breach simulations that pressure-test incident response plans and playbooks.

Bespoke Investigation

Bespoke Investigation

Custom forensic engagements tailored to unique technologies or regulatory requirements.

Custom forensic engagements tailored to unique technologies or regulatory requirements.