Complete systems analysis of live systems for forensic evidence
Forensics analysis of hard drives for evidence of crimes, intrusions, or incidents. Such evidence can be taken to authorities and courts
Detection of root kits, back doors, Trojans etc for forensic purposes
Forensics assessment of network appliances for evidence of intrusion or undue activity
Onsite malicious code detection, clean up, and incident management
Defending a network against an active attack (ie. DDoS, corporate espionage, counter attack, etc.)