Collect and Preserve
Information Governance Process and Patented Solution for Network Evidence Discovery
LIABLITY & ISSUES
How do you know afterwards what really has happened and when? And do you need authentic evidence to prove it?
Plan & Prepare
Plan to collect network data from critical places and prepare to preserve it safely for authentic evidence purposes.
IMPLEMENT & ROLLOUT
Spread the solution and manage using information governance process. Authorised user has only ephemeral access to CySec Vault(tm).
Chain-of-custody and authentic evidence management enables professional post-intrusion and post-incident root cause analysis (RCA).
Patented solution to collect network payload and preserve all safely for a very long time. Implement it as You need, from a single installation to a full-scale multi-tenant, multi-company EMS. With Evidence Gateway, fully compatible with the Network Evidence Reference and Discover Model™.
❝ When you need to report what has happened in the network, and how!
Auditing and assessment
Audit-trail of network data available for periodic analysis of realized cyber risks to be reported to Financial Reporting.
Integrity of data, access, and chain-of-custody is preserved by using of security of hardened OS and patented solution.
Whenever needed analysts may discover relevant, authentic evidence and prove what has happened with sufficient genuine data.
Available also Network Evidence Reference & Discover Model, and Information Governance training of network evidence management.
CySec Ice Wall
Hits: 485 Jari Vildén Digitalisation has changed our community for good. Same technological improvement has created robust platform for criminal actions. Organisations are adviced to raise awareness on how to improve their readiness to mitigate possible cyber threats and prepare for future cyber attacks. As an extra noticeable item to security topic will be the[…]