Vigilance™ Incident Response & Forensic Analysis

Within a data breach scenario, an effective incident response plan is critical in limiting the scope and impact of the incident. Having qualified incident responders available to lead an investigation greatly improves the ability of an organization to quickly assess, contain, and eliminate a data incident.

We offer a variety of Incident Response Solutions based on the needs of your organization

Diamond Icon | Intrinium.com

Immediate

Your organization has experienced a breach and needs immediate remediation and activation to maintain business continuity and compliance. Hourly based model, dependent on complexity, and timeline to resolve.

Emergency Incident Response Includes:

 

Incident Response Playbook by Certified Professionals
Remote and On-Site Support
Remote and On-Site Support
Triage Analysis
Diamond Icon | Intrinium.com

Retainer

Your organization is looking to be prepared for if/and when incident remediation may need to happen. Hourly based retainer model.

Retainer Incident Response Includes:

 

24x7x365 Security Incident Hotline
Remote Support within 12 hours
On-Site Support within 36 hours
Flexible Use of Hours
Pre-Negotiated Rates and Standard Contract
Triage Analysis

We are here to help, contact us today.

Business Continuity Through Remote Operations

Business Continuity Through Remote Operations

The coronavirus pandemic has caused a unique shift in our lives. From families to businesses to first responders, everyone has been impacted. We wanted to send you an update on how we are ensuring our clients are secure, and how we can help your business get set up to...

Best Practices: Fortinet FortiGate Firewall Hardening

Best Practices: Fortinet FortiGate Firewall Hardening

By Sahan Fernando - Director, Managed Security - Intrinium  As business needs continue to develop, many organizations are turning to devices to effectively provide availability, confidentiality, and integrity for their networks. The buzz around “next-gen” firewalls is...

Understanding Incident Response, Planning and Cyber Insurance

Understanding Incident Response, Planning and Cyber Insurance

In less than one year, we’ve seen whole cities taken out by ransomware with no business continuity or disaster recovery plan in place to bring themselves back up- but it’s not just cities that don’t have a plan for when a catastrophe (digital or physical) hits.
Having a plan to restore business operations will save time, money, and stress, but that’s half the equation.  The other half is to practice the plan, make sure all the moving pieces fit together and make sure everything is practical and timely. Enough businesses have spent six digits or more due to not having an incident response plan- set your business and your industry apart.

Incident Response Plans: More Planning, Less Panic

Incident Response Plans: More Planning, Less Panic

In less than one year, we’ve seen whole cities taken out by ransomware with no business continuity or disaster recovery plan in place to bring themselves back up- but it’s not just cities that don’t have a plan for when a catastrophe (digital or physical) hits.
Having a plan to restore business operations will save time, money, and stress, but that’s half the equation.  The other half is to practice the plan, make sure all the moving pieces fit together and make sure everything is practical and timely. Enough businesses have spent six digits or more due to not having an incident response plan- set your business and your industry apart.

Multi-factor Authentication 101

Multi-factor Authentication 101

Multi-factor authentication (MFA) is a method of authentication in which a computer user is given access after presenting two or more pieces of evidence or factors to an authentication mechanism.

The Case for Password Management Software

The Case for Password Management Software

Password Managers do just that, allowing you to almost outsource the storing, memorization, and generation of passwords while maintaining only a single password that you have to remember to access the rest.

The Low Down on Intrusion Prevention and Detection Services

The Low Down on Intrusion Prevention and Detection Services

By Samantha Agather, Information Security Analyst - Intrinium The Low Down on Intrusion Prevention and Detection Services In an ideal world, companies could focus all their time and resources on their products and services. However, our world is far from perfect, and...

Tribe of Hackers Interview with Kylie

Tribe of Hackers Interview with Kylie

Chiara Morrison, Marketing, Manager sat down to interview Manager, Security Consulting, and the founder of DC509, Kylie Martonik to talk about her contribution to the new the book, Tribe of Hackers.

Capture the Flag Comes to Spokane

Capture the Flag Comes to Spokane

Chiara Morrison - Manager, Marketing  Spokane Mayor's Cyber Cup 2019 Chiara Morrison sat down to interview the creator of Spokane Mayor’s Cyber Cup 2019, Max Dulin, Senior at Gonzaga University, Computer Science Major. Chiara: Max, can you tell me a little bit about...

Pin It on Pinterest