Response Services
Digital forensic analysis and incident response services.
Contain your incidents
Ransomware, Trojan horses, phishing and CEO scams are some of the main threats that constantly affect organizations around the world. Thanks to the digital forensic analysis service, we help you to contain potential incidents in your company in a timely manner, to analyze and take the necessary security measures to prevent them from happening again.
Respond in a timely manner
-
Expert advice for containment and response to any security incident, physical or virtual
-
Proven experience in a multitude of forensic experts, in civil and criminal cases, in national and international companies
-
Expert opinions signed by qualified engineers, in accordance with Art. 340 of the Civil Procedure Law (1/2000)
Methodology
- We help contain and analyze your cybersecurity incidents using forensic techniques, with the necessary guarantees of evidence preservation and chain of custody.
- We support the definition of security plans in order to prevent investigated incidents from materializing again.
- We have certified personnel and experts who will allow you to respond to most of the current threats and who will safeguard the interests of your organization.
Phases of a service
-
1
We study the background of the incident, the environment surrounding the event, the personnel and third parties involved and their contractual and legal situation.
-
2
We establish the proper chain of custody, generating a documentary record to control access to all the forensic evidence.
-
3
We extract all data from the evidence using forensic techniques that guarantee its integrity and non-repudiation.
-
4
We analyze the evidence using cutting-edge forensic technologies, based on the recommendations of the UNE 71506 standard.
-
5
We issue an expert forensic report with complete detail on the action carried out, in accordance with the guidelines set out in the UNE 197001 standard.
Response Services
Forensic examinations
We analyze your electronic assets in order to determine the events that occurred during a cybersecurity incident, writing complete expert reports as third-party experts.
Threat Hunting
We proactively analyze your systems assuming a possible compromise by analyzing the TTPs used by cybercrime.
Incident response
We support you in the assessment and containment of security incidents you may experience. Our expert staff will help you contain the problem and take the necessary steps to restore the service.
Playbook design
We design and write playbooks for your response processes to any type of cyber incident.