Can be investigated without relying on your antivirus software.
The "Virus Detailed Analysis Service" involves investigating suspicious samples to analyze their behavior, including whether they are of the type that "leaks information" and what kind of information they leak. The results of this analysis will be submitted as a report. This analysis can also serve as a criterion for determining whether specialized investigations (such as forensic investigations) are necessary. Additionally, the greatest feature of this service is that it can be conducted independently of the antivirus software you are using. It can be utilized for risk management in the event of a virus infection and as a reporting document for upper management. Furthermore, by understanding the behavior of the infected virus, it can also serve as a guideline for improving internal compliance. Moreover, this service is available for purchase on a ticket basis, allowing for low-cost utilization, and when combined with our NRMS series services, it enables immediate response to major incidents. *For more details, please download the PDF or feel free to contact us.*
Inquire About This Product
basic information
【Survey Items】 1. Confirmation of infection behavior 2. Presence of information leakage 3. Presence of communication and the destination of communication - Protocol and port number - Destination URL, etc. 4. Types of information that may have leaked (examples) - Online banking information - Machine information/drive information - System information - Types of leaked files (Excel/Word, etc.) - Username/password, etc. 5. Presence of vulnerability exploitation and information about vulnerabilities 6. Information on files or registry entries created 7. Expected intrusion routes - Information based on assumptions and inferences that can be confirmed from the information provided *For more details, please download the PDF or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
"Please consult us in such cases." ■ The machine has become slow. ■ The network has become slow. ■ A virus that was supposed to be removed keeps being detected. ■ I opened a suspicious attachment. ■ I downloaded a suspicious file. *For more details, please download the PDF or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
Since our establishment, we have been providing management solutions such as system operations, support desks, and application management, focusing on security solutions like detecting and controlling unauthorized communications and encryption systems that arise from the convenience of antivirus software. We aim to provide an environment where our customers' computers can be used more safely through our Network Remote Monitoring Service. Please feel free to contact us if you have any requests.