Call a Specialist Today! (02) 9388 1741

Compromise Assesment
Gain visibility and identify potential compromise in your environment.

Software Product Image

Palo Alto Networks Products
Compromise Assesment
Compromise Assesment
#COMPROMISE-ASSEMENT
Our Price: Request a Quote

Click here to jump to more pricing!

Please Note: All Prices are Inclusive of GST

Overview:

Gain visibility and identify potential compromise in your environment.

Hunt for threats and perform a deep dive into impacted systems. Our threat-informed approach and security experts help you reveal threat actors who may be hiding in your environment. By knowing what was executed, when and which files were accessed, you will have the information needed to defend your organization.

Identify red flags of potential compromise

Through a combination of Unit 42® cybersecurity expertise and the power of Cortex XDR®, you can identify indicators of malicious activity and threat actor presence.

Detect and mitigate hidden cybersecurity risk

Discover potentially unwanted programs, unauthorized activity, risky configurations and unusual user activity that may ordinarily slip under the radar.

Gain visibility and improve your defenses

Achieve peace of mind with a holistic view of your attack surface and understand how to limit exposure to threat actors and malicious activity.

Here’s what we deliver

Expert-Led Cloud Architecture Deep Dives

This assessment provides visibility into your organization to answer a very fundamental question: Am I compromised? Here is what you’ll get with this service:

Executive Summary

You will receive an Executive Summary tailored to nontechnical audiences and executives. This report will detail high-level findings and recommendations resulting from the Compromise Assessment and highlight any evidence indicating unauthorized activity in your environment.

Technical Report

Your security team will receive an in-depth Technical Report describing the details of the engagement background, scope, analysis findings, recommendations and remediation steps. You’ll get technical details about unauthorized activity or indicators of compromise identified in your environment.

IT Hygiene & Compliance Findings

In addition to identifying indicators of active compromise, Unit 42 will uncover nonmalicious evidence that could increase the risk of future compromise. Examples of these findings include local administrative accounts, potentially exposed credentials, and suspected shared or default accounts.

Prioritized Recommendations

Unit 42 will develop specific recommendations based on findings made throughout the assessment, which will be prioritized and aligned with your overall security strategy. Each recommendation will be assigned a ranking of effort and criticality, so you can prioritize your risk remediation efforts.

Find hidden indicators of compromise and reduce risk

Gather organizational context

Obtain an understanding of your procedures, tools and capabilities through a pre-engagement survey.

Deploy Cortex XDR

Successfully deploy Cortex XDR®, with recommended endpoint coverage of at least 90%, as Unit 42 coordinates with your team.

Collect forensic data

Leverage Cortex XDR to collect data artifacts around user actions, services, software and configurations.

Facilitate deep analysis

Identify indicators of unauthorized access, data exfiltration, lateral movement, malicious file execution and persistence.

Detailed findings and recommendations

Receive a detailed report from Unit 42 experts highlighting risks and vulnerabilities, with recommendations for improvement.

Documentation:

Download the Compromise Assesment Datasheet (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.

Pricing Notes:

Palo Alto Networks Products
Compromise Assesment
Compromise Assesment
#COMPROMISE-ASSEMENT
Our Price: Request a Quote