Portfolio
Scope of Incident Response Service



External Attack Surface Assessment
External Attack Surface Assessment



Indicator of Compromise (IOC) Determination
Indicator of Compromise (IOC) Determination



Malware In-depth
Malware In-depth



Malware Family and Type Identification
Malware Family and Type Identification



Malware Eradication
Malware Eradication



Initial Attack Vector Identification
Initial Attack Vector Identification



Remediation
Remediation



Kill Chain / Chain of Infection Determination
Kill Chain / Chain of Infection Determination
TIARA Case Study
Customer Profile
In 2018 a mid-sized financial services company, serving the investment needs of large enterprises, SOEs, banks and insurance companies, discovered that two of its virtual servers were infected with two different types of ransomware. Sangfor deployed their Endpoint Secure and Cyber Command solutions.
Existing Security
- Protection Perimeter Gateways
- Endpoint Protection

Pitfalls of the Traditional Approach

Limited Detection
Traditional FW and AV are limited to known attacks

Narrow Space
FW blind to internal activities & AV limited to managed endpoints

Lack of Security Operations
Protection available without response capabilities

Wide Open
FW is designed to open doors to apps & partners.
Blog
See More