Compromise Assessment & Digital Forensics
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
Properly Analyze and Document a Variety of Incidents
Leverage VerSprite’s extensive experience in compromise assessment and digital forensics to properly analyze and document a variety of incidents, including intellectual property theft, email compromise, data recovery due to destruction or accidental deletion of files, malware/ransomware recovery, and beyond. Contact us for a customized, strategic approach or retainer options. Our services include analysis of the following environments:
-
Operating Systems
Microsoft Windows Server & Desktop Apple
- Mac OS
Linux Servers, Desktops & Mobile Devices
- Linux distributions including RedHat & Ubuntu and their derivatives
Cloud Environments
- Amazon Web Services (AWS)
- Google Cloud
- Microsoft Azure
-
Technical Services
- Network Monitoring and Analysis
- Malware Analysis
- Ransomware Recovery
- Insider Threat Analysis
- IoT Forensics
-
Forensic Image Creation
- Forensic duplication (physical or logical images) of mechanical and solid state hard drives.
- VerSprite uses industry standard hardware or software methods for duplicating media. Image types include:
- Media to media
- RAW
- EnCase format e01
- Media to file (in any number of formats)
-
Log Collection, Review, and Analysis
- Infrastructure logs
- Network router and switch logs
- Web proxies
- Active Directory Logs
- Directory Services Logs
-
Email Forensics
- Analysis of phishing attacks
- Identification of sensitive information that may have been compromised
-
Memory/RAM Capture & Analysis
- Physical & virtual system
- Process reconstruction
- Network connection reconstruction
-
Reporting
- Actionable reports that contain a comprehensive remediation plan created with your business goals in mind
- Timeline creation
- Expert witness testimony
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /