Overview
Sentinel’s compromise assessment uses lightweight scripts coupled with AI-based tools to identify anomalies and correlate them to root causes. These indicators of compromise (IOCs) answer the question, “Are we (or have we previously been) compromised?” If no compromise is detected, our focus shifts to identifying any risks detected in your AWS systems. When attempting to identify a compromise, Sentinel’s expert technical analysts investigate the following areas: Compromise assessments can be performed for any or all of the following technologies. • Data Exfiltration & Sabotage • Command & Control (Botnet) Detection • User Account Activities • Malware & Persistence Tools • Network, Host, & Application Configurations • Privilege Escalations • Risks & Vulnerabilities AREAS OF EXPERTISE • Client & Server Endpoint Devices • Cloud Email Platforms • Network Edge Devices •Perimeter Web Servers • Active Directory
Highlights
- Incident Response
- Cybersecurity
Details
Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Support
Vendor support
1.800.769.4343 (main)
1.844.297.4853 (Incident Response Emergency)