Bluedog Compromise Assessment

Man monitoring the dashboard

What is a Compromise Assessment?

A Compromise Assessment is designed to find bad threat actors already active or recently active within your network.

Our CA experts do this by carefully analysing data from your network assets, endpoints, network layers and external sources. We correlate this information along with threat intelligence to find any evidence of recent or current compromise of your network. We then report on our findings giving detailed remediation and mitigation advice.

End Point Analysis
End Point Analysis

We analyse the end points to detect persistence systems used by attackers, we also scan system logs for evidence of a compromise and scan the end point for indicators of compromise.

Network Analysis
Network Analysis

As well as scanning the network for signs of historical compromise, we would also recommend our proprietary MDR system to provide real time detection of threat actors currently at work within your.

External Sources
External Sources

Our deep and dark web experts will search for evidence of compromise on sites and forums. This may take the form of password, email account details and other credentials posted by threat actors.

Which Organisations should have a Compromise Assessment?

  • If you've had a recent breach you should have a Compromise Assessment to ensure that the attackers have been eradicated.
  • If you are planning an acquisition, a Compromise Assessment is (or should be) part of the Due Diligence and risk assessment process.
  • If you think that you may have been compromised but don't have any clear evidence.
Buildings
Shield with lock

Benefits of a Compromise Assessment

  • Gives you confidence that your network security platform is performing as you expect.
  • Helps identify hidden threats within your network infrastructure.
  • Provides advice and recommendations.