support_agent Services

Specialists when you need them most

From immediate ransomware containment to 24/7 monitoring — senior teams covering the full threat response lifecycle.

01 / IR

Incident Response

schedule 24/7 on-call — Target SLA under 4h

Elite team for containment and recovery during security crises. We engage from hour one — isolating systems, preserving evidence and coordinating recovery while you keep the business running.

emergency_home

Containment

Immediate isolation of compromised systems. Blocking ongoing lateral movement and exfiltration.

manage_search

Investigation

Forensic analysis of memory, logs and artifacts to identify the initial vector, scope and actual impact.

restore

Recovery

Secure system restoration with integrity validation. Elimination of persistence mechanisms and control hardening.

gavel

Notification

Support for mandatory notification to ANPD within 72h (LGPD) and specialized legal counsel.

Incident types covered

Ransomware / mass encryption CRITICAL
Data exfiltration and leaks HIGH
Privileged account compromise HIGH
Supply chain attack HIGH
DDoS and service disruption MEDIUM
Espionage and APT CRITICAL

24/7

Uninterrupted monitoring

<15min

Target alert for critical threats

AI

Automated N1 triage

N3

Dedicated senior analysts

02 / MDR

Managed Detection & Response

SOC as a service with senior analysts and autonomous AI. We monitor your entire infrastructure — endpoints, network, cloud and dark web — and respond to threats before they become incidents.

person_search

Proactive Threat Hunting

Analysts actively hunt threats based on MITRE ATT&CK TTPs, without waiting for automated alerts.

summarize

Monthly executive reports

Complete threat landscape, contained incidents and security posture overview for CISO and leadership.

verified

Guaranteed SLA

Service level agreement with defined and monitored MTTD and MTTR metrics.

03 / DFIR

Digital Forensics & Investigations

Digital evidence collection and analysis preserving chain of custody. Supporting investigations of internal fraud, information theft, corporate espionage and regulatory compliance.

memory Volatile memory (RAM) forensic analysis
bug_report Recovery and analysis of malware artifacts
gavel Legal chain of custody preservation
timeline Log analysis and timeline reconstruction
groups Support for HR/Legal internal investigations
description Expert reports for use in legal proceedings

Typical DFIR deliverables

01

Executive report

Incident summary, impact and recommendations for leadership. Non-technical language.

02

Forensic timeline

Detailed chronological reconstruction of the attack — from initial access to containment.

03

IOCs and detection rules

Compromise indicators and YARA/Sigma rules to prevent reinfection.

04

Expert report

Document with evidentiary value for use in civil and criminal proceedings.

swords

Red Team / Adversary Simulation

Realistic simulation of advanced threat groups (APT) against your security controls, using the same TTPs documented in MITRE ATT&CK.

code

Application & API Pentest

Vulnerability assessment of web applications, mobile apps and APIs — OWASP Top 10, business logic and authentication.

phishing

Social Engineering & Phishing

Simulated phishing campaigns, vishing and pretexting to measure human resilience — the most critical link in the chain.

cloud_done

Cloud Security Assessment

AWS, Azure and GCP configuration review — IAM, bucket exposure, network policies and exposed secrets.

04 / RED TEAM

Red Teaming & Pentest

Tests based on real adversary behavior — not just a CVE list. Our Red Team uses the same techniques as advanced threat groups to identify flaws that automated scanners would never find.

What you receive at the end

  • check_circle Executive report with quantified business risk
  • check_circle Technical report with PoCs and step-by-step reproduction
  • check_circle Prioritized remediation roadmap (risk × effort)
  • check_circle Free retest of remediated vulnerabilities
  • check_circle Presentation for leadership and CISO

Talk to a specialist

For active emergencies, use the emergency button in the footer. For assessments and projects, schedule a call with our technical team.

Explore products