Incident Response

If you suspect that there is something wrong with your network, for instance:

  • Your network is under DDoS-attack;
  • Your employees’ accounts are compromised;
  • There is data leakage in you network;
  • Any other suspicious network activity
  • We are ready to perform immediate response to the incident, carry out an investigation in order to stop the incident and mitigate attack consequences.


    You can prevent reputational and financial damage, localize and stop the incident. Upon our works, you receive the report with detailed chronology of events and recommendations on prevention of similar incidents in the future. 


    Reasonable and appropriate measures are taken to ensure that your personal data is protected from unauthorized access or modification, unlawful destruction, and improper use. No information provided by you will be made available to third parties. Personal data will be held only for as long as is necessary for the purpose for which it is provided and, in any event, will only be kept for 24 months after any application you have made has been completed. By submitting your personal information, you consent to the use of your information as set out in this statement.