Developers: | BI.Zone |
Date of the premiere of the system: | 25.11.2022 |
Technology: | Information Security - Information Leakage Prevention, Information Security - Security Information and Event Management (SIEM), IT outsourcing |
The main articles are:
2022: BI.Zone Compromise Assessment Service Presentation
On November 25, 2022, the company BI.ZONE introduced the BI.ZONE Compromise Assessment service, designed to help detect traces of penetration into. The IT infrastructure service analyzes corporate infrastructure to identify current and past ones. attacks hackers
Crackers strive to stay unnoticed as long as possible - from penetration to detection can take several weeks, or even months. Even if the company suspects that it was hacked, without advanced tools it will be difficult to determine which systems are compromised and how to prevent this from happening again. As a result, an organization can suffer losses from repeated attacks through the same backdoor or software bookmark left on the first hack.
With the tightening of legislation on personal data, another source of financial risks appears. If a leak is detected, it is necessary to report to the regulator in a short time on the causes of the incident and the safety measures taken. If you do not figure out exactly how the cyber attack occurred, the company risks receiving serious fines. In order to thoroughly study all the circumstances of the incident, you need to conduct a complete inspection of the infrastructure. BI.ZONE Compromise Assessment allows you to do this in the shortest possible time.
The service helps businesses understand whether hackers have infiltrated corporate systems. The BI.ZONE command checks the entire IT infrastructure using a number of proprietary developments, including the EDR (Endpoint Detection and Response) class solution. Automated scans of endpoints, network perimeters, mail, and external resources, combined with additional threat hunting, leave virtually no blind spots.
The service gives the organization a broad and deep look at its IT infrastructure. The company will be able to identify the presence of malware, determine the tools used by hackers, and, if necessary, conduct a full-fledged investigation.
"It takes an average of 200 days to detect a sensitive data breach. This is because professional cyber groups often penetrate the infrastructure using legitimate tools that are not detected by means of protection and monitoring. The tools based on BI.ZONE Compromise Assessment allow you to identify hacks even using standard utilities, "said Mikhail Prokhorenko, head of the BI.ZONE cyber threat department. |