Handling a security breach can be a nightmare, especially if your company does not have an IT security operation center. Spentera offers our expertise in incident response covering intrusion analysis and recovering. Our intrusion analyst and incident response team try to bring an incident under control within the shortest possible time and strives to trace and evict the culprit without hampering routine activities.

Our intrusion analysis and forensic investigation service helps customers combat cyber-attacks and crime. This security tools help respond quickly to potential malicious attacks that can lead to service disruptions. When a customer suspects that their system has been compromised, Spentera incident assessment service can help answer that question.

Our Approach

Incident response, intrusion analysis and forensic procedures vary depending on specific organization in terms of business functions, information technology, public information, law enforcement etc. Below are the example objectives that should be included in those processes to ensure appropriate response to security-related incidents.

  • Verify that an incident occurred
  • Reduce the impact
  • Determine how the attack was done or the incident happened
  • Prevent future attacks or incidents
  • Improve security and incident response
  • Prosecute illegal activity
  • Keep top level management informed of the situation and response

Attacks often compromise personal and business data, and it is imperative to respond quickly and effectively. One of the benefits of having an incident response capability is that it supports responding to incidents systematically (i.e., following a consistent incident handling methodology) so that appropriate actions are taken. It also helps personnel minimize loss or theft of information and disruption of services.


Intrusion analysis usually comes with forensics investigation for further detail analysis to find the root cause of the incident. Such investigation will evaluate the nature of a security breach, determine its impact on the company, prevent it from occurring in the future, as well as provide evidence of misuse if necessary. Investigations can range from researching external malicious attacks, employee misuse of corporate assets or data – whether accidentally or for their own personal gain – and loss of intellectual property via internal or external threats.

Our forensics investigation team perform the analysis based on various objectives, such as discovering the perpetrator’s location, their identification and damaged instances which may involve different technologies like servers, laptops, portable media, mobile phones and backup devices. We pursue the latest anti-forensic challenges and resolve data recovery, data theft, criminal activities, fraud investigation and illegal content violations that occur within the organization’s policies. Collecting all sets of evidence by logging malicious, technical or accidental activity under industry-approved guidelines can help an organization to move forward with legal action. Our consultants apply the industry’s best practices, guidelines and specialized evidence handling procedures to meet the needs of customers of all sizes. A final report contains the details of the investigation process and the evidence collected.

Computer Forensic Services

Our computer forensic service offerings enable customers to better understand their forensic readiness, and react quickly to any potential security incident. These services include:

Forensic Readiness Assessment

Our consultants help companies identify appropriate policies, procedures and technologies that should be implemented in order to build a security framework that will support forensic investigation in the future. IT organizations that perform a readiness assessment, and make forensics part of an overall incident response plan, are better prepared to identify issues and react quickly to an unforeseen breach, thereby lessening the impact on the company.

Digital Forensics Investigation

In the event of a security incident, Spentera performs a complete investigation, leveraging proven best practices to ensure the integrity of the investigation. Results are reported back and data are presented in a format designed to provide customers with comprehensive evidence. Our report also includes recommendations on how to prevent the incident from occurring in the future.

Proactive Security Remediation and Forensics Service

Spentera offers an annual proactive forensics service which bundles in a readiness assessment as well as guaranteed Service Level Agreements (SLAs) in response to any security incident that might occur during that period. This helps customers demonstrate their security due diligence from a compliance standpoint, can mitigate unplanned expenses related to a security incident and ensures a rapid response. In addition, it provides clients a kind of insurance policy against any major security breach and guarantees a response according to the terms of their SLA.

Compromise Assessments

Spentera performs this assessment to gain a better understanding of an event by finding and analyzing related facts. We conduct this service by following basic steps in forensics, namely collecting, examining, analyzing and reporting, and using computer forensic investigation approach as stated in the NIST SP-800-86.

Who need this?

Those who want to experience a security breach and understand the details, such as the cause of the breach, when and how it happens and the people responsible.

Those who want to know if a breach had happened at a certain point, primarily because they have detected something unusual on their network or system.

Try our Intrusion Analysis and Forensics Investigation service?

Contact us for Inquiry
Call (021) 2276 8811