24/7 aid with cyber incidents.
Have you experienced a cyber security incident that you require immediate assistance on?
You can call our hotline every day, whole day. Priority will be given to CSIRT customers with a retainer.
First consult is free
No costs for your first consultancy call
Rapid isolation of threats to limit the impact of a security breach
Over 20 responders active across Europe
Retainer customers receive a call back within a set time period as per SLA
Complete incident report
Receive a full incident report and post-incident debrief of all findings
Retainer customers receive competitive SLAs for dispatching Incident Responders to site
Technology independent. We can work with anything.
Your support in case of emergency
In case of an incident, it’s very important to stay calm and take immediate and efficient action. Time is of the essence, so do not hesitate to call our emergency hotline. An experienced Computer Security Incident Response Team (CSIRT) can help you. During your first call, the emergency incident response team will discuss the situation with you in order to get an indication of the problem and its liabilities. The CSIRT specialist will consult with you on first steps and recommendations. The team will then contact your nearest CyberSOC to quickly propose a plan, time schedule and price indication to contain and remediate the incident.
Don’t wait for an incident to happen – be prepared: sign-up for our Incident Response retainer and benefit from priority treatment, guaranteed response times, and instant deployment of our emergency teams.
The most common things the CSIRT gets called out for:
O365/Cloud Service Breaches
With more and more infrastructure getting moved into the cloud, the CSIRT has seen a big increase in breaches in cloud services. The cause of these breaches ranges from simple credential stuffing, phishing attacks, right through to far more advanced and targeted attacks. Orange Cyberdefense’s aim when dealing with any cloud service based incident; work out the root cause of the attack, and advise our clients so the same attack is not possible in the future. Where possible the CSIRT will also try and improve any general security issues to help strengthen your cloud infrastructure.
In the last 12 months the CSIRT has seen two types of ransomware; the first is the more traditional. A non-targeted phishing link is clicked on by a user, that then (via numerous attack vectors) infects the user’s system with ransomware. Typically this attack method doesn’t use self-propagating strains and is easy to contain and eradicate. The second type is far more dangerous. The CSIRT has seen attackers gain a foothold on a network, then use a variety of network attack tools to get higher and higher network privileges. Once the attackers have a good hold on the network, they deploy and activate very well written ransomware. These attacks typically affect the majority of a client’s IT estate, including the deletion of backups. The experience of the CSIRT dictates that the later attacks are hard to recover from and can cost millions to get out of.
Don’t wait for an emergency!
Not in a current incident? Our Incident Response Retainer packages get preference over other cases, price advantages and proactive consultancy. With an Incident Response Retainer you are always sure to be the first one in line in times of need.Download the datasheet
|tick Orange Cyberdefense CSIRT on-demand 24×7||tick Orange Cyberdefense CSIRT on-demand 24×7|
|tick Access to Orange Cyberdefense CSIRT – Remote Response team||tick Access to Orange Cyberdefense CSIRT – Remote Response team|
|tick Access to Orange Cyberdefense CSIRT – Incident Management team||tick Access to Orang Cyberdefense CSIRT – Incident Manager team|
|tick Daily Incident Report included||tick Daily Incident Report included|
|tick Full Incident Report included||tick Full Incident Report included|
|tick Post-incident debrief included||tick Post-incident debrief included|
|tick Incident Response workshop required|
|tick Organisational Readiness Assessment|
|tick Process Gap Analysis|
|tick Personnel and Technology Review|
|tick Retainer-based SLA for Remote Response|
|tick Retainer-based SLA for On-Site Response|
|tick Pre-purchased hours can be utilised for Incident Response consulting|