Forensic Analysis

Investigate the Event. Document the Activity. Preserve the Evidence.

Things happen fast in a crisis. Preserving key evidence can sometimes get overlooked until it’s too late. Capturing key forensic details is essential to discovering the extent and potential origins of an attack.

We can help you understand the details of your event and preserve data for future legal or enforcement action. Our scientists and researchers can also reverse engineer malware found on your systems to discover hidden details about the attack and its potential origins.

  • Understand the target and scope of the event
  • Limit over-reporting a data loss or disclosure
  • Determine the who, what, where, when, why and how long of an incident whenever possible

Examine

The Optiv team will quickly examine your systems and malware to determine if a compromise has occurred and recommend immediate next steps to protect your organization.

Capture

Security teams often lack the skills to preserve digital evidence and indicators of compromise. We can help you capture and retain the data you need.

Preserve

The wrong move can eliminate critical evidence and data from your systems. Our experts have helped hundreds of organizations preserve the details they need to take action.


Our Services

 

Malware Reverse Engineering

Through the use of manual and automated tools, our experts will examine the offending code on your systems to determine the source of the malware, the methods used to attack your systems and the goal of the attacker. This investigation also aids in effective and permanent removal of malware from your IT infrastructure.

Forensic Analysis and Data Capture

Over the course of hundreds of successful investigations, our breach and compromise experts have developed the forensic analysis and data capture expertise necessary to keep your company protected.


Get In Touch

Whether you are looking for general information or have a specific question, we want to help.

Contact Us