Brutale offers cybersecurity services managed by professional engineers with several years of experience and international recognition.
1
2
A continuous service to check and follow-up vulnerabilities, including the delivery of regular reports based on OSSTMM, ISSAF, NIST800-115, OWASP, PTES, and PCI
3
Emulation of real attacks (black/white/grey box) and tailored exploits. Follow-up of vulnerabilities.
4
The thread detection service collects and analyzes network traffic to find malicious patterns and detect infected machines.
A forensic analysis of key internal assets is executed and an artifact checking of the extraction (files, IPs, domains, URLs…). Using the collected data we also offer an answer to the incidents raised.
5
Analysis, IOC extraction, and identification of malware samples checking domains and IPs.
6
Tailored services to fight against computer felonies and protect systems that are exposed directly or indirectly to the Internet.
7
Alerting and follow-up of similar domains that are registered, monitoring of your domains and email records (MX), keywords exploration.
8
Specific trainings of you staff in security