Overview
Sentinel’s compromise assessment uses lightweight scripts coupled with AI-based tools to identify anomalies and correlate them to root causes. These indicators of compromise (IOCs) answer the question, “Are we (or have we previously been) compromised?” If no compromise is detected, our focus shifts to identifying any risks detected in your AWS systems. When attempting to identify a compromise, Sentinel’s expert technical analysts investigate the following areas: Compromise assessments can be performed for any or all of the following technologies. • Data Exfiltration & Sabotage • Command & Control (Botnet) Detection • User Account Activities • Malware & Persistence Tools • Network, Host, & Application Configurations • Privilege Escalations • Risks & Vulnerabilities AREAS OF EXPERTISE • Client & Server Endpoint Devices • Cloud Email Platforms • Network Edge Devices •Perimeter Web Servers • Active Directory
Sold by | Sentinel Technologies |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
1.800.769.4343 (main)
1.844.297.4853 (Incident Response Emergency)