Crypsis I.C.E. Methodology

Do you suspect your network is under attack?

Using the Crypsis I.C.E. Methodology™, we rapidly Identify, Contain, and Eradicate attacks

Baseline Approach:

  • Verify an attack occurred
  • Identify the attacker’s path of entry
  • Ensure that access has been blocked
  • Determine the severity of the breach

When your network is secured and the scope of your attack defined, Crypsis can perform a more precise forensic investigation to understand which data is at risk and conduct a deeper investigation.

Analytical Approach:

  • Analyze malicious software to find actionable indicators of compromise
  • Analyze data collection files
  • Determine detailed risk exposure to applications such as databases

What service is right for you?

Under attack?

Contact Crypsis