Digital Forensics and Incident Response (DFIR)

Our incident response service hotline provides 24-hour, all-day-of-the-year access to top incident responders and digital forensic specialists who can immediately support your task force in the event of a cyber emergency. Thanks to our prior on-boarding, guaranteed response time, as well as our constant availability, you save time where it matters. In addition, we conduct regular simulations with you and your organization in order to further optimize and improve our joint relationship, to keep a cool head in case of emergency and to protect you from the worst-case scenario.

Analysis

Our DFIR specialists have been explicitly trained to respond to incidents and suspicious activities. In case of an emergency, we help

  • contain the infrastructure,
  • prevent further spreading,
  • kill the entry path and propose immediate measures,
  • analyze the system for malware,
  • identify and isolate devices,
  • hunt the entire fleet and collect evidence.

 

Our team is available around the clock to support you in case of suspected breaches and to plan the next steps.

 

On-boarding

On-boarding ensures that our DFIR specialists focus on the incident rather than wasting time understanding your infrastructure, gaining access and deal with legal and compliance matters. A dedicated contact person (single point of contact) ensures that all our information is kept up-to-date and that we keep track of the major changes in your environment.

We ensure that all important questions and requirements are clarified in advance:

  • All contact persons are defined.
  • Reporting of incidents is regulated.
  • Secure data exchange and continuous flow of information are ensured.
  • Accesses are prepared.
  • Important documentation / concepts and topologies are available.
  • Critical assets and scenarios are known.
  • Our tooling is tailored to work in your environment.

 

Expert Panel

With access to the Compass Security Expert Panel, security-relevant questions, decisions and actions can be backed up and challenged with the help of our security specialist team. You will receive competent recommendations and suggestions that will help you to implement immediate measures.

 

Simulation

Regular tabletop exercises of real-life scenarios help to train your blue team. The simulation aims to make involved people understand their responsibilities. It challenges their ability to really get tasks done and tests whether cooperation among the members is efficient. Moreover, it helps us to understand whether requested data and artifacts really contain the information we need to follow up leads during an investigation. After the exercise, the results are discussed with the client and an action item list is drawn up to improve the readiness of the entire organization.

Contractual Models Switzerland

 

We are glad to give you further information: Your contact person

CALENDAR

Beer-Talk in Bern: Bluetooth Low Energy: Protocol, Security & Attacks

Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

Compass Security an der ETH Kontaktparty

Wir nehmen teil an der schweizweit grössten akademischen IT-Recruitingmesse. Komme am Samstag, 29. Februar 2020 an die ETH Zürich und besuche uns am... Read more

Beer-Talk #21 in Berlin: Lessons learned from Shitrix

Gefahr für tausende Firmen, öffentliche Einrichtungen und Behörden. Wir berichten von unseren gewonnenen Erkenntnissen aus der kritischen... Read more

ALL DATES

NEWS

KMU im Visier von Cyberkriminellen

In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

Daten als Wettbewerbsvorteil

Das Basel Economic Forum ist das Wirtschaftsforum für die trinationale Metropolitanregion Basel und die Nordwestschweiz. Im November fand die 6.... Read more

Vulnerability in Apache Olingo OData 4.0

Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

ARCHIVES

Compass Security Blog

Invoice Fraud with Everything the Bag of Tricks Has to Offer

Sometimes, it doesn't take much for a good scam: a good story, a little persuasion, then disappear again… and sometimes, the scammers come up with tactics that come straight out of the textbook. mehr

OWASP – Toronto January 2020

A write-up of the OWASP Toronto January talk which mainly focused on the correlation and integration of results generated by automated tools in application security such as SAST, DAST and SCA.... mehr

ZUM BLOG