(972)-591-8515 info@aansystems.com

Response Services

Be warned of unknown threats, new risks and malicious activities that impact your business. Identify compliance gaps, evaluate measures to manage risks and to reduce information security incidents.

Advance Persistent Threat Assessment

Attackers have advanced techniques, lending them multiple targeting and intelligence gathering capabilities.

What We do

Hackers use these capabilities to compromise and eavesdrop on target systems. Once the hacker is on the system, the persistence strategy is one of “low and slow” to allow continued monitoring and data extraction, while avoiding detection.

How We Do Our Assessment

We passively analyze internet traffic at your gateway for up to two weeks; in this time any threats, risks, and abuses of internet security will be logged. At the end of the two weeks, a detailed report is created for the customer, and a consultant will provide a debrief on what has been found, explain the threats, and make suggestions for improvement.

The Benefits

  • Ensuring that critical and key systems are threat free
  • Providing evidential style reports for compliance and industry regulation adherence
  • Verifying and forensically analyzing a suspected attack or compromised host
  • Identify key areas for improved protection and response
  • Achieving a proactive rather than a reactive security posture.

Incident Response and Digital Forensics

Security incidents and losses are on the rise, yet many organizations do not have a plan in place to diagnose and handle a breach.

What We do

While you can’t prevent every possible incident, our Detection and response team can help you to respond quickly and minimize damage and downtime when attacks and exploits occur. We take a comprehensive and proactive approach to help you protect, detect, correct, and adapt.

How We Do Our Assessment

Collect identifying, labeling, recording, and acquiring data from the possible sources of relevant data, while following procedures that preserve the integrity of the data.

Examine: Forensically processing collected data using a combination of automated and manual methods, and assessing and extracting data of particular interest, while preserving the integrity of the data.

Analyze: Analysing the results of the examination, using legally justifiable methods and techniques, to derive useful information that addresses the questions that were the impetus for performing the collection and examination.

Report: Reporting the results of the analysis, which may include describing the actions used, explaining how tools and procedures were selected, determining what other actions need to be performed.