SECURITY THREAT AUDIT
EXPERIENCE THE CONFIDENT SECURITY OF BEING A VIGILANT CLIENT
During our industry leading Security Threat Audit, Vigilant’s Hunt Team proactively monitors your network for signs of anomalous activity indicative of active compromise, misconfigurations and other notable security risks. After, you'll receive a written report containing the findings, classifying your threat level and providing you recommended courses of action.
Our team observes, investigates and verifies the following:
- Database access attempts
- Review of database connections
- Remote Desktop access attempts
- SSH Access Attempts
- Inbound FTP connections
- Review of connections and authentication of credentials in the clear
- PN Connections – specifically locations of access, single-factor detection and access control
- Web Proxy Discovery
- DWeb Proxy Discovery
- Communicating applications and vulnerabilities
- Outdated OS communication
- All communications in and out of your environment over time
- Contact information and call escalation paths with your team
- All connection traffic for the time frame since installation
- All alerts for the time frame our sensor has been fully operational
- Perform a review and proactive hunts of data in your environment