NTT Security Logo

Compromise Assessment

Whether you are proactively validating your security posture or are a new CISO assuming responsibility for an existing environment, performing a compromise assessment can give organizational stakeholders the peace of mind that the environment is free from ongoing compromise.

Our security experts will deploy tools at internet egress points and on critical servers and endpoints. We also use our Global Threat Intelligence Platform (GTIP) to identify any indicators of compromise (IOC) in your environment and comparative analysis to identify non-IOC specific anomalous behavior.

In a Compromise Assessment engagement, our security experts will:

  • Identify internet egress points, critical servers and endpoints
  • Implement and configure analysis tools
  • Identify any IOCs, including malware artifacts or network traffic activity
  • Report any red-flag indicators

Supplemental preparatory services are available to make sure you have the right foundations in place for every engagement:

  • Network discovery and documentation
  • Systems inventory

Supplemental advanced services provide additional assistance in the event a compromise is uncovered:

Supplemental integration services provide your organization with additional assistance to handle the impact of an incident:

  • Executive findings presentation

Threat Mitigation and Remediation Strategy