ISSP Labs & Research Center was established in 2015 with the aim of providing digital forensic investigation services, including collection, preservation, analysis, and presentation of computer-related evidence.
It specializes in the analysis of computer networks security elements and systems, including penetration testing, investigation of cyber-attacks through collecting and analyzing evidence, analyzing malware samples and finding indicators of compromise.
We simulate an attack on your IT systems and networks to identify vulnerabilities that may pose risks for your organization and compromise mission and business critical assets. Penetration testing allows revealing vulnerabilities an attacker could exploit to gain access to your environment and systems. The penetration testing results will provide a picture of vulnerabilities which your organization is exposed to. Pentesting will also help evaluate the staff’s reaction to different situations and decide if employees need additional training.
We identify evidence of ongoing or past intrusions in your environment, assess weaknesses and vulnerabilities in your security architecture, and define missing and bad IT and cybersecurity practices. Utilizing the actual database of indicators of compromise, patterns of malicious behavior, and memory forensic tools our experts evaluate network traffic, servers, endpoints, and logs to answer the question of whether your organization has been breached.
Identification of compromised systems and bad practices will help you see your organization’s systemic risks and exposures as well as increase your ability to respond effectively to future incidents.
We analyze malware samples to understand the anatomy of an attack, extract indicators of compromise and examine whether the computer infrastructure has been breached. Utilizing the most advanced technologies and expertise ISSP Labs & Research Center offers solutions that make a difference.
ISSP Labs conducts digital investigations, collects and analyzes evidence of cyber attacks. The forensic work is performed following the latest international standards and procedures. Our experts keep track of the latest cyber threats and TTPs used by threat agents and, from that perspective, identify even the most difficult to find evidence of cyber attacks.