Compromise Assesment
Gain visibility and identify potential compromise in your environment.
Click here to jump to more pricing!
Please Note: All Prices are Inclusive of GST
Overview:
Gain visibility and identify potential compromise in your environment.
Hunt for threats and perform a deep dive into impacted systems. Our threat-informed approach and security experts help you reveal threat actors who may be hiding in your environment. By knowing what was executed, when and which files were accessed, you will have the information needed to defend your organization.
Through a combination of Unit 42® cybersecurity expertise and the power of Cortex XDR®, you can identify indicators of malicious activity and threat actor presence.
Discover potentially unwanted programs, unauthorized activity, risky configurations and unusual user activity that may ordinarily slip under the radar.
Achieve peace of mind with a holistic view of your attack surface and understand how to limit exposure to threat actors and malicious activity.
Here’s what we deliver
Expert-Led Cloud Architecture Deep DivesThis assessment provides visibility into your organization to answer a very fundamental question: Am I compromised? Here is what you’ll get with this service:
Executive SummaryYou will receive an Executive Summary tailored to nontechnical audiences and executives. This report will detail high-level findings and recommendations resulting from the Compromise Assessment and highlight any evidence indicating unauthorized activity in your environment.
Technical ReportYour security team will receive an in-depth Technical Report describing the details of the engagement background, scope, analysis findings, recommendations and remediation steps. You’ll get technical details about unauthorized activity or indicators of compromise identified in your environment.
IT Hygiene & Compliance FindingsIn addition to identifying indicators of active compromise, Unit 42 will uncover nonmalicious evidence that could increase the risk of future compromise. Examples of these findings include local administrative accounts, potentially exposed credentials, and suspected shared or default accounts.
Prioritized RecommendationsUnit 42 will develop specific recommendations based on findings made throughout the assessment, which will be prioritized and aligned with your overall security strategy. Each recommendation will be assigned a ranking of effort and criticality, so you can prioritize your risk remediation efforts.
Find hidden indicators of compromise and reduce risk
Gather organizational contextObtain an understanding of your procedures, tools and capabilities through a pre-engagement survey.
Deploy Cortex XDRSuccessfully deploy Cortex XDR®, with recommended endpoint coverage of at least 90%, as Unit 42 coordinates with your team.
Collect forensic dataLeverage Cortex XDR to collect data artifacts around user actions, services, software and configurations.
Facilitate deep analysisIdentify indicators of unauthorized access, data exfiltration, lateral movement, malicious file execution and persistence.
Detailed findings and recommendationsReceive a detailed report from Unit 42 experts highlighting risks and vulnerabilities, with recommendations for improvement.
Documentation:
Download the Compromise Assesment Datasheet (PDF).
Pricing Notes:
- All Prices are Inclusive of GST
- Pricing and product availability subject to change without notice.
