Compromise Assessment and Digital Forensics

Compromise Assessment & Digital Forensics

  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /

Properly Analyze and Document a Variety of Incidents

Leverage VerSprite’s extensive experience in compromise assessment and digital forensics to properly analyze and document a variety of incidents, including intellectual property theft, email compromise, data recovery due to destruction or accidental deletion of files, malware/ransomware recovery, and beyond. Contact us for a customized, strategic approach or retainer options. Our services include analysis of the following environments:

  1. Operating Systems

    Microsoft Windows Server & Desktop Apple

    • Mac OS

     

    Linux Servers, Desktops & Mobile Devices

    • Linux distributions including RedHat & Ubuntu and their derivatives

     

    Cloud Environments

    • Amazon Web Services (AWS)
    • Google Cloud
    • Microsoft Azure

     

  2. Technical Services

    • Network Monitoring and Analysis
    • Malware Analysis
    • Ransomware Recovery
    • Insider Threat Analysis
    • IoT Forensics
  3. Forensic Image Creation

    • Forensic duplication (physical or logical images) of mechanical and solid state hard drives.
    • VerSprite uses industry standard hardware or software methods for duplicating media. Image types include:
      • Media to media
      • RAW
      • EnCase format e01
      • Media to file (in any number of formats)
  4. Log Collection, Review, and Analysis

    • Infrastructure logs
    • Network router and switch logs
    • Web proxies
    • Active Directory Logs
    • Directory Services Logs
  5. Email Forensics

    • Analysis of phishing attacks
    • Identification of sensitive information that may have been compromised
  6. Memory/RAM Capture & Analysis

    • Physical & virtual system
    • Process reconstruction
    • Network connection reconstruction
  7. Reporting

    • Actionable reports that contain a comprehensive remediation plan created with your business goals in mind
    • Timeline creation
    • Expert witness testimony