Compromise Assessment

Find Cybersecurity Compromises and Prevent Attacks with BlackBerry Cybersecurity Services.

We can help you rapidly determine if your organization is compromised or shows signs of past cyber incidents. And we deliver expert guidance to improve cybersecurity and prevent future attacks. Request a quote or call us now at +1-888-808-3119.
What Is Compromise Assessment?

What Is Compromise Assessment?

Compromise assessment is a type of cyber risk assessment that identifies threats lurking in an organization’s network. First, cybersecurity experts identify indicators of compromise (IOCs). Then, they investigate in-depth the risk-prioritized findings. A report shares these findings and identifies ways to reduce the attack surface.

Compromise assessment analyzes cyber risk exposure, such as data exfiltration and sabotage, command and control activities, user authentication abnormalities, malware persistence mechanisms, and vulnerable network host and application configurations. Compromise assessment is part of cyber incident response.

Compromise Assessment Services

A compromise assessment by BlackBerry Cybersecurity Services has two phases. The first phase is data collection and initial threat hunting. The second phase is a targeted cybersecurity assessment based on the initial findings.

Data Collection and Threat Hunting

In the first phase, you are provided a lightweight package of software and scripts that captures data for the BlackBerry® Cybersecurity Services compromise assessment team. Collected data includes filesystem metadata from endpoints, log data from network devices, event and alert data from ancillary security systems, and more. Our cybersecurity experts then use cloud-based compromise tools and best-practices methodologies to normalize, contextualize, enrich and format the data. A proprietary analytics engine processes the digital forensics artifacts, and the results are used to identify hosts of interest and suspicious activities for phase two, the targeted investigation.

Targeted Investigation

In the second phase, you receive standalone executables to deploy to the hosts of interest to collect in-depth digital forensics data about the suspicious activity flagged during the first phase. If we discover evidence of a past breach, BlackBerry Cybersecurity Services compromise assessment experts can identify when, where, and how it occurred, and recommend how to prevent recurrence. If a breach is in progress, our compromise assessment service can transition seamlessly to incident response (IR) to trace the kill chain, document exploited vulnerabilities, assess impacts, and develop remediation plans.

Use of AI in Cybersecurity Assessment

Best-practice, field-proven compromise assessment methodologies that leverage artificial intelligence (AI) produce results fast. By integrating BlackBerry® Cylance® AI-powered technology into our compromise assessment tools and processes, the BlackBerry Cybersecurity Services rapidly produces preliminary results, often detecting commodity attacks and advanced persistent threats (APTs) within hours of initial data collection.

Find the Best Cybersecurity Assessment Vendor for You

We help organizations of all sizes and in all industries identify cybersecurity risk and protect against cyberattacks. Our compromise assessment service can help you:

  • Determine if a network has been compromised.
  • Obtain cybersecurity results in weeks, not months.
  • Minimize the impact on your IT system resources through a scalable and efficient process that uses dissolvable scripts and a lightweight agent, such as that of CylancePROTECT®
  • Assess cybersecurity compromises of Windows®, macOS®, and Linux® operating systems.

BlackBerry Cybersecurity Services are available to every organization. There is no requirement to be an existing BlackBerry customer to receive our compromise assessment services.

Your Compromise Assessment Report

As part of the compromise assessment service, BlackBerry Cybersecurity Services provides a cybersecurity report for your executive team with two parts:
Your Compromise Assessment Report Your Compromise Assessment Report Your Compromise Assessment Report

Threat Hunting Report

If we detect a past or current compromise, the cyber assessment report details the findings, including the nature of the compromise, its extent and impact on your network environment.

Your Compromise Assessment Report Your Compromise Assessment Report Your Compromise Assessment Report

Attack Surface Reduction Report

Strategic and tactical recommendations provide a risk-prioritized assessment of how you can improve cybersecurity and reduce your attack surface.

Choose the expertise of a top cybersecurity vendor. Contact BlackBerry Cybersecurity Services to discuss your compromise assessment needs.

Resources

Structural Dependency
Compromise Assessment Use Cases: Achieving Cyber Resilience with BlackBerry Cybersecurity Services
Get the Use Case
Structural Dependency
Compromise Assessment: Identify and Assess Past Breaches to Proactively Prevent Future Incidents
Get the Data Sheet
Structural Dependency
Case Study: Investment Bank Takes on Cybersecurity
Read Now

Compromise Assessment FAQ

What is a compromise assessment report?

What is the relationship between compromise assessment and threat hunting?

What is the relationship between compromise assessment and incident response?

What is the relationship between compromise assessment and vulnerability assessment?

What is an indicator of compromise?