• Home
  • Services
  • Forensic Services

Forensic Services

Remediate current incidents and prevent the future ones

Incident response and investigation

About service

A network breach by an unauthorized user is always bad news—but the silver lining is that forensic analysis can help you to minimize your exposure and prevent other breaches in the future.

Positive Technologies provides deep, expert analysis of intrusion incidents. Our experts examine your current organizational and technical environments, determine the root cause of the breach, identify who or what is responsible, and provide recommendations for improvement.

Our forensic investigations generally include:

  • Gathering information about the incident from servers, workstations, transferable media, and network equipment
  • Collecting data from service providers (via law enforcement requests)
  • Creating an expert, reliable, and factual account of the incident on the basis of the information collected
  • Forming conclusions about the cause of the incident and (when possible) the persons responsible
  • Recommending preventative measures to avoid future incidents

Results

The key deliverable from our testing is a report detailing:

  • Test methodology
  • Conclusions about the facts of the incident
  • Analysis of the causes of the incident (with evidence)
  • Recommendations for preventing future incidents

Retrospective event analysis

About service

In business and government spheres, cybersecurity risks took center stage in the last few years. Large-scale DDoS attacks, espionage by foreign intelligence agencies, money theft, ransom demand, and attacks against critical infrastructures—all that became an everyday reality of the modern interconnected world. Today the question is not whether you will be hacked, but when. Our analysis often reveals that criminals can stay unnoticed in infrastructure for years.

Retrospective event analysis is aimed at detecting attacks and compromise of infrastructure and critical components both currently and retrospectively. This service generally includes:

  • Processing of security events to detect potential security incidents
  • Determining the correlation between significant security events and events from other sources
  • Conducting expert analysis of findings
  • Preparing the full list of detected attacks, attempts, and compromise incidents, providing qualitative evaluation of incident severity and its influence on information systems
  • Developing recommendations on urgent measures to mitigate the damage and to prevent such incidents in the future and improve the protection level

Results

  • List of detected attacks, attempts, and compromise incidents
  • Qualitative evaluation of incident severity and its influence on the infrastructure
  • Procedures of urgent measures to mitigate the damage
  • List of recommendations for improvement of security measures

Company Services

  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Advanced Border Control

Company Products

  • MaxPatrol VM
  • PT Sandbox
  • MaxPatrol SIEM All-in-One
  • XSpider
  • PT Network Attack Discovery
  • MaxPatrol SIEM
  • PT BlackBox
  • MaxPatrol 8
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT MultiScanner
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • PT Industrial Cybersecurity Suite
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
  • PT BlackBox
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap