We Bring the R in MDR
Our DFIR Teams are the special forces of the cyber security world, able to quickly develop any situation and neutralize threats to stop in-progress attacks. On the prevent side, they are also the most experienced threat hunters as part of our MDR solution and work to spot and thwart latent or undercurrent threats before they can develop. Pondurance maintains an extremely deep and diverse team with specializations that differentiate us from most other IR providers. Our teams include the following competencies.
- Incident Responders – The incident responders engage rapidly when called in, with the primary objectives to scope the incident, then contain it. Containment of any incident is essential above all else in order to stop the spread of infection, eliminate any possibility for recurrence, and facilitate recovery of the operation. The responders that are part of Pondurance’s DFIR teams are experienced and know exactly how to engage with immediate results.
- Incident Handlers – Every crisis situation, including a cyber security incident, needs a cool and dispassionate head to seamlessly orchestrate activities toward the proper end state goal. The Incident Handlers of Pondurance are trained to provide effective situational management through coordination and tracking of all activities, along with direct interactions with company management to provide status and next steps. For heavily regulated industries, our Incident Handlers also have a deep level of governance and compliance expertise that can directly influence the situation to generate positive outcomes.
- Forensic & Malware Specialists – The specialist with deep technical forensic skillsets is one of the most important, yet one of scarcest resources in all of IT. The perishable skill of forensics requires a constant stream of activity to foster the appropriate experience. It is at this level that in which the success or failure of an incident response engagement is determined. The Pondurance team of specialists are constantly engaged in both real life and training scenarios that hone those skills, including: advanced event triage and forensics; malware reverse engineering; exploit kit inoculations; anti-forensics mitigation; disk and file level forensics; and data extraction and recovery.