Authentic Evidence

Collect and Preserve

Information Governance Process and Patented Solution for Network Evidence Discovery
LIABLITY & ISSUES

How do you know afterwards what really has happened and when? And do you need authentic evidence to prove it?

Plan & Prepare

Plan to collect network data from critical places and prepare to preserve it safely for authentic evidence purposes.

IMPLEMENT & ROLLOUT

Spread the solution and manage using information governance process. Authorised user has only ephemeral access to CySec Vault(tm).

ENJOY BENEFITS

Chain-of-custody and authentic evidence management enables professional post-intrusion and post-incident root cause analysis (RCA).

CySec Vault™

Patented solution to collect network payload and preserve all safely for a very long time. Implement it as You need, from a single installation to a full-scale multi-tenant, multi-company EMS. With Evidence Gateway, fully compatible with the Network Evidence Reference and Discover Model™.

When you need to report what has happened in the network, and how!


 

  • Auditing and assessment

    Audit-trail of network data available for periodic analysis of realized cyber risks to be reported to Financial Reporting.

  • Chain-of-Custody preserved

    Integrity of data, access, and chain-of-custody is preserved by using of security of hardened OS and patented solution.

  • Authentic Evidence

    Whenever needed analysts may discover relevant, authentic evidence and prove what has happened with sufficient genuine data.

  • Information Governance

    Available also Network Evidence Reference & Discover Model, and Information Governance training of network evidence management.

LATEST NEWS

CySec Ice Wall

Member of

Member of

MEMBER OF