Harbinger Compromise Assessment Service.
Harbinger Compromise Assessment is now available for small to large enterprises, as well as Government, Healthcare, Educational, and Financial institutions.
Harbinger Compromise Assessment gives you the opportunity to survey your network compromise landscape. Compromised systems, created through the download of botnet, trojan,and other malicious software, open your network to data loss and criminal control. The Harbinger assessment will give you insight into the state of systems on your network, allowing you to identify compromised systems previously undetected by your current security architecture.
Contact us for your free Harbinger Compromise Assessment.
The threat of compromise is ever present, and even the most vigilant and well rounded security policies and hardware/software security suites are susceptible to breach. The Harbinger assessment reveals your network's compromise risk level, alerting you to the percentage of network activity which is considered high risk and may result in future network compromise.
How does it work?
Defence Intelligence has a unique approach to security. Harbinger requires no client side hardware or software installation. Harbinger focuses on DNS traffic and needs only high level data to provide deep level detail. Our proprietary compromise detection tools are backed by a team of expert threat analysts. We can quickly and thoroughly determine if your network is compromised, at risk of compromise, and if new security considerations should be made for your network safety.
At the conclusion of each Harbinger Compromise Assessment, the client will receive a compromise summary report, which includes:
The Baseline
The Baseline is the initial observation period over the network, establishing normal behaviour specific to that network. Harbinger tracks core traffic details, including query counts by hour and peak query times. Benign automated software is also identified. All of this information is used by our automated analysis tools to highlight malicious traffic behaviour which reveals compromise and compromise risk.
Network Breakdown
The breakdown of traffic by Harbinger categorizes all outgoing queries, as benign, malicious, or suspicious. Harbinger charts this information to build an overall compromise assessment summary of your network.
Compromise Details
If compromised systems are discovered, Harbinger and the Defence Intelligence team details the malicious software related to the compromise and compiles all the relevant details to assist the customer in mitigating the compromise.
Contact us for your free Harbinger Compromise Assessment.
Find out more...
