Unleash Your Secure Future with PT ESC

PT Expert Security Center provides services for detecting, responding and investigating complex incidents, as well as monitoring the security of corporate systems.
Reach out for a consultation

01

Your trusted cybersecurity partner

PT Expert Security Center is a team of dedicated experts and threat researchers who elevate your company's security measures and enhance your incident response capabilities. With over 20 years of experience, our team has been at the forefront of cybersecurity, assessing systems, investigating incidents, and studying major APT groups. This rich experience allows us to develop unique, practical cybersecurity techniques tailored to your needs.

Expert content for Positive Technologies products

Leveraging our extensive research and knowledge of the latest cyber threats, we create standards for automated security products and solutions.

Incident investigation

From high-profile attacks to major events like the FIFA World Cup 2018 and Sochi 2014 Olympics, our experts have a proven track record in incident response and security management.

Threat Intelligence

We continuously study the tactics and techniques of cybercriminals globally, investigating well-known APT groups and discovering emerging threats.

02

Incident response and investigation

Each incident must be treated as a learning opportunity to prevent its recurrence. Our experts will help you to organize a proactive response, contain the breach, and mitigate its consequences together with your cybersecurity team.

30 minutes

ready to engage in your project within 30 minutes of your request

60 minutes

can provide initial analysis results within 60 minutes

What we do

1

Interview witnesses to get a full and reliable picture of the incident

2

Build an anti-crisis team with your cybersecurity specialists

3

Reconstruct the kill chain and closely examine all the systems compromised by hackers

4

Carefully assess all the associated risks and impact on business processes

5

Analyze cause-and-effect relationships to pinpoint why the attack was successful in the first place

6

Resolve the consequences as quickly as possible and provide actionable recommendations to prevent future incidents.

03

Compromise assessment

Your company's perimeter might already be infiltrated and hackers remain in the system undetected. We can identify any compromised assets, detect signs of intruders, and carefully evaluate the risks involved. Our experts will act quickly to deny the attackers access to your system and minimize the impact of the breach.

37 days

the average time from break-in to the detection of attackers

In 25%

In 25% of our compromise assessments, we discovered traces of APT groups that had infiltrated company infrastructures and remained undetected for six months to a year

*Based on the internal incident investigations research for 2021-2023 years.

What we do

1

Scan file systems and RAM on nodes to find malware and study it using statistical and behavioral analysis.

2

Examine OS and security event logs, user activity, and malware traces on endpoints.

3

Use our own reputation base to analyze network artifacts.

You need a compromise assessment if...

  • to ensure hackers haven't penetrated your network
  • to assess infrastructure security during mergers
  • to investigate suspicious activities
  • to verify if your supply chain has been compromised
Contact us

04

PT ESC Threat Intelligence

We study the ever-changing landscape of cyberthreats to better understand how attackers act.

40% of incidents were related to the activities of known APT groups*

Based on the internal incident investigations research for 2021-2023 years.


Businesses must stay updated on the latest cyberthreats to prioritize endpoint protection effectively. Since 2015, we've studied APT group activities, strategies, and tools, regularly publishing our findings to share current attack vectors. Our experts have discovered new APT groups like TaskMasters, Calypso, ChamelGang, Space Pirates, Hellhounds, ExCobalt. This extensive knowledge base helps us not only resist but also prevent attacks, integrating these insights into Positive Technologies products to enhance their capabilities.

Our focus:

Collaboration

Quick transfer of threat intelligence data to Positive Technologies products.

Defending the Future

Rapid detection of potential risks.

Staying Ahead

Knowledge of past and current hacking strategies.

Know more about our researches

All research

Get in touch

Fill in the form and our specialists
will contact you shortly