OUR SERVICES

OVERVIEW

Line How We Work

Organizations are becoming ever exposed as cyber attacks become more complex, creative, and targeted. The growing skills gaps make it even more challenging to support the growing availability of security tools needed for cyber resiliency.

The E.D.G.E SOC is a next generation platform that is fully managed by our team of experts 24x7. Our unique operational experience and collaboration platform means that you can focus on your business, while we monitor and respond to your security incidents and risks. In the face of an increasingly hostile threat environtment, the security opeation center integrates all the key elements you need to detect threats early, respond rapidly and decisively, at a price point with flexible engagement models that makes sense for your business.

The technology independent platform means that we can aggregate and correlate multiple monitoring sources, SIEM Solutions, Threat Intelligence sources, and Vurnetrability Scanning TOOLS.

KEY SERVICE ADVANTAGES

Garis Biru

THREAT HUNTING AND MALWARE / FORENSICS ANALYSIS

Objective

Leverage nation-state level offensive and defensive security experts to provide in-depth analysis of system’s logs, routing analaysis and artifacts for incident confirmation and hunting.

Service Overview

Our specialists have broad knowledge of advanced attack methods and deep knowledge of malware or machine level exploits. The team conducts threat hunting and stands ready to participate incident response bring specialized expertise in malware reverse engineering, network forensics and endpoint forensics.

Service Component

  • Host/network forensics
  • Static/dynamic malware analysis
  • Forensics investigation for endpoints including PCs, laptops, mobile devices, IoT devices, etc.
  • Malware reverse engineering
  • Threat hunting indicators of attacks

THREAT HUNTING AND MALWARE / FORENSICS ANALYSIS

Objective

Leverage nation-state level offensive and defensive security experts to provide in-depth analysis of system’s logs, routing analaysis and artifacts for incident confirmation and hunting.

Service Overview

Our specialists have broad knowledge of advanced attack methods and deep knowledge of malware or machine level exploits. The team conducts threat hunting and stands ready to participate incident response bring specialized expertise in malware reverse engineering, network forensics and endpoint forensics.

Service Component

  • Host/network forensics
  • Static/dynamic malware analysis
  • Forensics investigation for endpoints including PCs, laptops, mobile devices, IoT devices, etc.
  • Malware reverse engineering
  • Threat hunting indicators of attacks
Life Cycle Icon 1 Image RGB Edit
Mobile LC Left
Mobile LC Right
1 LC
2 LC
3 LC
Logo Footer

88 Office Tower, 28th Floor,
Jl. Kasablanka Raya Kav.88, Jakarta Selatan, DKI Jakarta. 12870.

info@edge-cyber.com

LESS RISK AND ACHIEVE MORE.

EDGE-CYBER © COPYRIGHT 2019 - ALL RIGHT RESERVED.