SECURITY THREAT AUDIT

EXPERIENCE THE CONFIDENT SECURITY OF BEING A VIGILANT CLIENT

During our industry leading Security Threat Audit, Vigilant’s Hunt Team proactively monitors your network for signs of anomalous activity indicative of active compromise, misconfigurations and other notable security risks. After, you'll receive a written report containing the findings, classifying your threat level and providing you recommended courses of action.

Our team observes, investigates and verifies the following:

  • Database access attempts
  • Review of database connections
  • Remote Desktop access attempts
  • SSH Access Attempts
  • Inbound FTP connections
  • Review of connections and authentication of credentials in the clear
  • PN Connections – specifically locations of access, single-factor detection and access control
  • Web Proxy Discovery
  • DWeb Proxy Discovery
  • Communicating applications and vulnerabilities
  • Outdated OS communication
  • All communications in and out of your environment over time
  • Contact information and call escalation paths with your team
  • All connection traffic for the time frame since installation
  • All alerts for the time frame our sensor has been fully operational
  • Perform a review and proactive hunts of data in your environment

Vigilant is committed to ensuring the security and protection of the personal information that we process, and to provide a compliant and consistent approach to data protection. If you have any questions related to our privacy policies, please contact legal@vigilantnow.com