The purpose of a search for compromise is to check if an attacker is present in your IS.
Recent news proves that computer attacks are more and more targeted and are able to remain in an IS for several years.
With our expertise in Windows systems, we have developed our internal tools to meet the demanding level of quality that we have set for ourselves. This allows us to conduct search for compromise with high added value. We are working with a non-signature based detection system to highlight unknown malware. Moreover, our tools are able to work in both user mode and kernel mode.
Our search for compromise is based on both automatic and manual analysis. This process allows our experts to take the time to contextualize the anomalies detected, thus significantly reducing the risk of false negatives.
Know if you are currently compromised
As soon as the CISO takes office,
it is essential to check that the IS is not already compromised