Incident Response - ESTec Security

By: Estec Security  09-12-2011

Information is the most valuable asset of the modern organization. The ability to quickly respond to security incidents and follow through with an investigation can mean the difference between acceptance of a major loss and apprehension and prosecution of any intruder, with the accompanying deterrent effect. For most businesses and organizations, there is no option: apprehend and deter.

The choice is how to do these things as effectively and economically as possible.

ESTec can place a security incident investigator on retainer so you can be sure of a quick response. Our specialist might even become a member of your own internal incident response team. A phone call to our security engineer and he or she will be there to trace source of the breech and help restore workability to the company. The incident investigator can then track the evidence back to the intruder.

Sample Case

Customer: A Savings and Loan Company
Services: Incident Response
Problem: A California Savings and Loan company had its entire mortgage database destroyed and needed to catch the culprit, restore the information, and assure its customers of better protection.
Solution: They were assigned one of our investigators, who was able to track the incident by examining log files and identifying the IP address of the computer that had originated the attack. With the cooperation of the security department of the computer's company, the offender's machine was seized, and an image of the hard drive given to our investigator.
A log of the event from both the attack machine and the victim machine was turned over to the FBI. Next, using an access control audit, he quickly and confidently identified the problem areas, and designed corrective measures to prevent a repeat intrusion.
Result: The perpetrator of this very destructive incident plead guilty and was sentenced to five years in jail.

Other products and services from Estec Security


ISO 17799 - ESTec Security

A risk assessment allows management to prioritize protection activities and incident handling allows the organization to evaluate how successful it has been in achieving the priorities. Over 30 countries either require ISO 27001 / ISO 17799 / BS 7799 certification for some organizations, or are considering requiring ISO 27001 / ISO 17799 / BS 7799 certification.


Vulnerability Assessment - ESTec Security

ESTec has experience reviewing systems with widely ranging sensitivities, ranging from Internet Banking to e-commerce to proprietary internal systems. Using industry-standard tools, a trained auditor reviews each machine, identifying all the services offered by the computer. A vulnerability assessment reviews the configuration of a computer or group of computers to identify known vulnerabilities.


Security Awareness Programs - ESTec Security

The consultant presented the courses and also trained the trainers to give the courses to existing pwersonnel or to new personnel entering the workforce.The initial testing of the courses received such high reviews that management rolled out the course to 20,000 users, 1,000 managers, and 400 systems administrators.


Penetration Testing - ESTec Security

Customer: Major American Power and Gas UtilityServices: Penetration Test the SAP Accounting systemProblem: The utility was preparing to convert all accounting functions to SAP R/3. The penetration testing methodology used by ESTec ensures that all potential weaknesses are tested, including all currently identifiable vulnerabilities.