forensics and incident response

Forensic Analysis of Systems

Complete systems analysis of live systems for forensic evidence

Hard Drives Analysis

Forensics analysis of hard drives for evidence of crimes, intrusions, or incidents. Such evidence can be taken to authorities and courts

Rootkit Detection

Detection of root kits, back doors, Trojans etc for forensic purposes

Network Forensics

Forensics assessment of network appliances for evidence of intrusion or undue activity

Virus/ Malware Outbreak

Onsite malicious code detection, clean up, and incident management

Active Threat Defense

Defending a network against an active attack (ie. DDoS, corporate espionage, counter attack, etc.)