CYBER RISK MANAGEMENT SERVICES

Compromise Assessment

Discover potential compromises, understand the impact and get mitigation recommendations by engaging with our experts. Our threat-informed approach finds historical and ongoing indicators of compromise so you can respond before any further damage occurs.
BENEFITS

Gain visibility and identify potential compromise in your environment.


Hunt for threats and perform a deep dive into impacted systems. Our threat-informed approach and security experts help you reveal threat actors who may be hiding in your environment. By knowing what was executed, when and which files were accessed, you will have the information needed to defend your organization.

SERVICE FEATURES

Here’s what we deliver


This assessment provides visibility into your organization to answer a very fundamental question: Am I compromised? Here is what you’ll get with this service:

EXECUTIVE SUMMARY
EXECUTIVE SUMMARY

EXECUTIVE SUMMARY

TECHNICAL REPORT
TECHNICAL REPORT

TECHNICAL REPORT

IT HYGIENE & COMPLIANCE FINDINGS
IT HYGIENE & COMPLIANCE FINDINGS

IT HYGIENE & COMPLIANCE FINDINGS

PRIORITIZED RECOMMENDATIONS
PRIORITIZED RECOMMENDATIONS

PRIORITIZED RECOMMENDATIONS

METHODOLOGY

Find hidden indicators of compromise and reduce risk

PLAN
Assess

Gather organizational context

Obtain an understanding of your procedures, tools and capabilities through a pre-engagement survey.

PREPARE
PREPARE

Deploy Cortex XDR

Successfully deploy Cortex XDR®, with recommended endpoint coverage of at least 90%, as Unit 42 coordinates with your team.

PREPARE

Collect forensic data

Leverage Cortex XDR to collect data artifacts around user actions, services, software and configurations.

ANALYZE
ANALYZE

Facilitate deep analysis

Identify indicators of unauthorized access, data exfiltration, lateral movement, malicious file execution and persistence.

IMPROVE
IMPROVE

Detailed findings and recommendations

Receive a detailed report from Unit 42 experts highlighting risks and vulnerabilities, with recommendations for improvement.

WHY UNIT 42

World-renowned security experts, always in your corner


As an industry-leading threat intelligence, cyber risk management and incident response organization, it's our job to help you prepare and respond to some of the most challenging threats so that your team can get back to business faster. As threats escalate, we act as your trusted partner to advise and strengthen your security strategies.

Related resources

VIDEO

Log4Shell Compromise Assessment

REPORT

2022 Unit 42 Ransomware Threat Report

DATASHEET

Log4Shell Compromise Assessment

jeffries-logo

Go from reactive to proactive

Our consultants serve as your trusted advisors to assess and test your security controls against the right threats, transform your security strategy with an intelligence-informed approach, and respond to incidents in record time.
By submitting this form, you agree to our Terms. View our Privacy Statement.