Overview
Availability of at least 5 specialists to respond to the incident in progress;
Security Leader – Professional qualified to coordinate specialists, prioritize actions and make decisions about which paths should be taken;
Security Architect – Professional with a comprehensive view of good security practices, aiming to map vulnerable architectures and technologies that may be allowing the environment to be compromised;
Cloud Security Analyst – Professional specialist in the cloud computing environment and technologies, thus knowing configurations, tools, and functions that can be used to contain the threat.
Enterprise Security Analyst – Professional specialist in Enterprise-level security tools and resources, ranging from firewalls to endpoint defense;
Offensive Security Analyst – Professional with an offensive security vision, mapping the attack in progress, performing scans and pentests in real-time during the action to find, as quickly as possible, the loopholes that may be being used by the attacker;
If we understand based on the technologies adopted in the customer's environment that some of the positions most be occupied by professionals with other knowledge profiles, this adjustment will be made in agreement with the client.
Highlights
- Server analysis; Domain controller environment analysis; Forensic analysis of detected attack vector; Analysis of logs and audit trails of the resources involved in the incident; Analysis of network infrastructure and firewalls (if necessary); Application of emergency corrections of practices that are causing vulnerability; Application of best emergency practices at the infrastructure and operational systems level; Search for alternatives for attack mitigation and remediation;
Details
Pricing
Custom pricing options
Legal
Content disclaimer
Support
Vendor support
Support 24X7