Breach Assessment Service
Discover advanced attacks that have breached your environment and understand next steps for remediation.
Security assessments typically show that one out of four companies have multiple adversaries operating in their IT environments. Even worse, breaches and theft of data can go on for months without detection. Standard anti-virus tools only protect against known viruses, providing no security against a zero-day exploit or an organized attack.
CSC offers a comprehensive Breach Assessment Service to help discover whether advanced attack groups or other adversaries are currently active in your environment — or have been in the past.
This Breach Assessment Service, supported by security expertise and specialized software, helps organizations proactively identify suspicious activityand integrate CSC’s Cyber Assurance security services.
Using host and network-based technology, the assessment identifies systems with suspicious behavior and pinpoints other areas of concern within your network. Knowing about this malicious activity can prevent the theft of valuable intellectual property and adverse impact on business operations.
Industry-Leading Services and Software
Through CSC’s Cyber Assurance service, you receive expert support from account security managers, compliance assurance managers and other account-assigned security staff who focus on standardizing delivery, processes and reporting to drive cost and efficiency. CSC manages the delivery of security services to ensure you get the services you paid for and are being used effectively.
CSC combines these services with CrowdStrike’s Falcon Host software, which give near-instantaneous visibility into endpoint activity to identify any attackers who may be present in the your environment—and keep them out once ejected. Falcon Host supports:
- Unique Indicator of Attack (IOA) behavioral blocking
- Extensive prevention of privilege escalation, ransomware, zero-day exploits, and more
- Sophisticated machine learning-driven malware protection
- Real-time and historical analysis of key endpoint activity such as processes, threads and more
- The ability to stop the execution of malicious code, kill processes, and contain command and control callbacks.
CSC Cyber Assurance assists with the identification and gathering of metrics that measure the ongoing execution of agreed controls, demonstrating that we are managing your security risks.
CSC provides report metrics and trend analyses to demonstrate assurance, proactively identify compliance and control failures related to your business and the service we provide. Deliverables include:
- One-page summary of the work that can be externally shared and includes executive summary and findings
- Remediation or next-steps recommendations
- PowerPoint presentation of findings and recommendations
- Full report, including customized remediation recommendations, detailed findings, intelligence information and network analysis
Why Do You Need an Assessment?
Even if you have no indication of a breach, your environment may have been breached without you knowing it. The sooner you discover a past breach, the sooner you can mitigate the impact and address potential compliance issues.
If attackers have previously accessed your environment, there’s a good chance you’ll see more frequent and more targeted attacks. This breach assessment service can provide your organization with a proactive way to address this escalating threat environment.
Leading Tools and Methods
CSC combines more than 40 years of experience in information security with leading tools and methods to support your security program and protect your operations. In addition to breach assessment, CSC can provide Penetration Testing and help you develop Enterprise Security Roadmap to take your program to the next level.
CSC’s deep industry knowledge, security specialists, global delivery centers and our end-to-end solutions for traditional and next-generation technologies enable your company to securely adapt as your business and risks change.
CSC also draws on the technical and investigative skills of alliance partner CrowdStrike, with years of incident-response engagements and experienced resources with backgrounds in military and government intelligence agencies and top security consulting firms. CSC and CrowdStrike are working together to deliver a wide range of strategic solutions at global scale,
Discover advanced attacks with CSC’s Breach Assessment Service, Contact us for more information on assessing threats and preventing the next breach.