
The first step is to do an analysis of the current state of your network and the type of attack they carried out.
We have the products that allow us to analyze the state of your network to decide how to solve your current problems
It is very difficult to guarantee a result without doing an initial analysis, sometimes it is possible that the loss of information is definitive
We may need access to your network to the computers that suffered the attack to do an initial information survey.
We have products to do a forensic analysis and to finish what change in the computers that are under attack