Search
Our services

Incident Response and Forensics

24/7 availability in case of an incident

We provide our customers throughout Germany with 24/7 availability of our experts for incident response and forensics with guaranteed response times as well as a comprehensive range of services to handle targeted attacks and other IT security incidents.

In case of a cyber attack or an infection with ransomware, our experts are ready to act and

  • advise you on the selection of suitable immediate actions
  • support you during the processing and follow-up
  • support you during the recovery

This allows you to react quickly and in the correct way, so that the incident can be localized as soon as possible and be processed afterwards in order to reduce the impact to a minimum.

Due to our expertise, the BSI has listed us as a qualified APT Response service provider.

In addition, we support you with:

  • Detailed examination and forensics
  • Preparing and performing incident response exercises to practice the appropriate reaction
  • Consulting on and drawing-up of concepts for incident handling
  • Incident handling & response training

Forensic Investigations

Independent of our 24/7 availability, we have been assisting our customers with the forensic analysis of IT systems for many years.

Our specialists use professional tools on site or in our forensics and malware laboratory to examine incidents, affected systems and networks as well as malware that has been found.

Thus, we can reconstruct both the attack path and the sequence of events that took place and identify traces typical of the corresponding attack. Additionally, we look for possible indications of other affected systems, user accounts or data and examine a potential data leakage.

Our typical procedure includes, for example:

  • Reconstructing the sequence of events that took place or the infection path by analyzing logs and images of hard disks and main memories
  • Targeted search for files and contents on endpoints and drives in case of a suspected data leakage
  • Identifying the vulnerabilities having caused the intrusion
  • Live analysis of systems to collect further traces of determine the scope of an incident
  • Malware analysis of files and programs

We use customary tools to process and analyze the artifacts. The results of the analysis are summarized in a detailed report, and we can also create a forensic expert report if required.

Has your system been attacked?

If you have been the victim of a cyber attack, contact our specialists. With an appropriate contract, you can reach us around the clock in an emergency.

Search
Search