Vigilance™ Incident Response & Forensic Analysis

Home » Services » Managed Security Services » Vigilance™ Incident Response & Forensic Analysis

Within a data breach scenario, an effective incident response plan is critical in limiting the scope and impact of the incident. Having qualified incident responders available to lead an investigation greatly improves the ability of an organization to quickly assess, contain, and eliminate a data incident.

We offer a variety of Incident Response Solutions based on the needs of your organization


Your organization has experienced a breach and needs immediate remediation and activation to maintain business continuity and compliance. Hourly based model, dependent on complexity, and timeline to resolve.

Emergency Incident Response Includes:


Incident Response Playbook by Certified Professionals
Remote and On-Site Support
Remote and On-Site Support
Triage Analysis


Your organization is looking to be prepared for if/and when incident remediation may need to happen. Hourly based retainer model.

Retainer Incident Response Includes:


24x7x365 Security Incident Hotline
Remote Support within 12 hours
On-Site Support within 36 hours
Flexible Use of Hours
Pre-Negotiated Rates and Standard Contract
Triage Analysis

We are here to help, contact us today.

Multi-factor Authentication 101

Multi-factor authentication (MFA) is a method of authentication in which a computer user is given access after presenting two or more pieces of evidence or factors to an authentication mechanism.

The Case for Password Management Software

Password Managers do just that, allowing you to almost outsource the storing, memorization, and generation of passwords while maintaining only a single password that you have to remember to access the rest.

The Low Down on Intrusion Prevention and Detection Services

By Samantha Agather, Information Security Analyst - Intrinium The Low Down on Intrusion Prevention and Detection Services In an ideal world, companies could focus all their time and resources on their products and services. However, our world is far from perfect, and...

Tribe of Hackers Interview with Kylie

Chiara Morrison, Marketing, Manager sat down to interview Manager, Security Consulting, and the founder of DC509, Kylie Martonik to talk about her contribution to the new the book, Tribe of Hackers.

Capture the Flag Comes to Spokane

Chiara Morrison - Manager, Marketing  Spokane Mayor's Cyber Cup 2019 Chiara Morrison sat down to interview the creator of Spokane Mayor’s Cyber Cup 2019, Max Dulin, Senior at Gonzaga University, Computer Science Major. Chiara: Max, can you tell me a little bit about...

What is an Internal Vulnerability Test?

Chiara Morrison - Manager, Marketing  What is an Internal Vulnerability Test? The Intrinium Internal Vulnerability Assessment evaluates IT security from the inside of your organization and identifies critical vulnerabilities that could be exploited by attackers that...

What is a Risk Assessment?

Chiara Morrison - Manager, Marketing  What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1.     Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...

External Penetration Test 101

Chiara Morrison - Manager, Marketing  All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...

Side-Channel: Page Cache Attacks

A side-channel attack is an attack vector through which a threat could glean information from your computer or information system. This could be as simple as reading emissions (see Emissions Security or EMSEC) from your computer to using sophisticated methods of monitoring data being written onto your hard disk and making determinations that way.

Pin It on Pinterest