Incident Response
Rapid on-site deployment and remote response and mitigation of computer security incidents.
European Cybersecurity Company.
Threat Intelligence. Incident Response. Cyber Advisory.
Generation of new knowledge on cybersecurity incidents, vulnerabilities and malware, development of specialized tools for prevention, detection and response.
Ethical hacking, cyber intelligence, technical assessment and hardening of infrastructure and information systems, governance, risk management and compliance, trainings and exercises.
Cybersecurity incident response, acquisition of digital evidence, digital forensics and court expert witness services. Malware analysis, malware vaccines development and cyber counterintelligence.
IstroSec is an ethical company that conducts its business activities honestly, apolitically, directly and fairly to all parties involved.
To be an international leader in research, development and cyber security services and deliver strong, innovative and effective solutions to tackle cybersecurity challenges.
Our goal is to offer quality professional services to our customers at a reasonable price and to continuously increase our customer’s security resilience.
We have a track record of hundreds of incident response engagements, including APT groups, our own CVEs and countless pentests, malware analyses and trainings.
Our customers are SMEs, corporations, Fortune 500 companies and governmental entities across all industries which take cyber security very seriously.
Rapid on-site deployment and remote response and mitigation of computer security incidents.
Vulnerability Assessment, Penetration Testing, Red Team and Purple Team Engagements.
Active hunting for threats in infrastructure based on TTPs and searching for indicators of compromise.
Data Leaks Searches and Analysis, ClearWeb, DeepWeb, DarkWeb.
SOC Level 3+, administration and optimization of EDR, SIEM, SOAR and other cybersecurity technologies.
Acquisition of digital evidence, investigation, and reconstruction of security events and incidents. Processing of expert testimonies.
Analysis of properties, functionality, origin, potential impacts of malicious code, and reverse engineering.
Phishing, Spearphishing, Whaling. Custom Scenarios incl. Custom “Malware”. Simulation of advanced attacks and APT.
Audits and Implementations of Security Frameworks, vCISO. Technical Audits and Hardening.
Trainings for personnel, IT professionals and management. Tabletop exercises and drills.
Assessment of adequacy of processes and technology for swift and effective reaction.
Full array of CSIRT services, including 24/7 DFIR and proactive security.
GIAC Certified Forensic Examiner
GIAC Certified Forensic Analyst
GIAC Cloud Penetration Tester
GIAC Exploit Researcher and Advanced Penetration Tester
Certified Information Systems Auditor
Certified in Risk and Information Systems Control
Certified Information Systems Security Professional
Offensive Security Certified Professional
Offensive Security Wireless Professional
Horizon3.ai NodeZero Certified Partner
Horizon3.ai NodeZero Certified Seller
Horizon3.ai NodeZero Certified Operator
Certified Red Team Professional
Certified Red Team Expert
Certified Ethical Hacker
Computer Hacking Forensic Investigator
Cisco Certified Network Associate
NATO Cooperative Cyber Defence Centre of Excellence
Mobile Threats & Incident Handling; Digital forensics; Artefact Analysis
Cybersecurity Analyst+
Comptia advanced Security practitioner
CrowdStrike Certified Falcon Administrator
CrowdStrike Certified Falcon Responder
CrowdStrike Certified Falcon Hunter
Security, Compliance, and Identity Fundamentals
Azure Security Engineer Associate
Azure Solutions Architect Expert
Advanced Windows Security Course Certified Security Professional
SOC Analyst Course Certificate of Completion
Security Operations Center Assessment
Cyber Threat Intelligence
Adversary Emulation Methodology
Purple Teaming Methodology
Foundation Certificate in IT Service Management
Foundation Certificate in Project Management
Practitioner Certificate in Project Management
CyberSec First Responder
Cybersecurity tools like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) are made to assist organizations in detecting and preventing cyber threats.
Like last year, the prestigious international security conference GLOBSEC 2023 Bratislava Forum was held in Bratislava, which was attended by several well-known guests, including the highest state representatives of France, Ukraine, and Slovakia.
Security Orchestration, Automation, and Response is referred to as SOAR. It is a kind of technology that helps organizations enhance their security operations by automating and orchestrating a variety of processes and workflows.