Copyright © 2019 Proventus, Inc. All rights reserved. All other names and trademarks are property of their respective owners.


Post-breach Intelligence

Data breaches are not only devasting to an organization, but they can greatly affect your business partners, employees, and of course your customers. If your organization is victimized by a data breach it is necessary to try to find out the particulars of the “who, what, why, where and when.”


Putting the pieces together can be frustrating and costly. Most organizations do not have the skilled internal resources to undertake such a massive investigation. Finding the Indicators of Compromise (IOCs) determines the malicious activity of the breach and throughout the compromised network with minimal disruption to the operation.


Our team works with you to:


  • Determine how the breach occurred

  • Search for forensic evidence to determine the attack path and activity

  • Develop a timeline of the attack

  • Perform an overall assessment to determine the depth of the attack

  • Create a post-breach strategy to mitigate any future risk


We deliver a complete report on the breach and any exfiltrated data that the threat actor could have stolen. Our team will also scan and analyze Dark Web sources, the underground economy, hacktivist forums, and hacker dump sites to identify any exfiltrated data that may be available.


Proventus offers Compromised Credentials Monitoring, IP Reputation Intelligence, and Client-specific Intelligence that can help mitigate risk before a breach occurs.

Find out how we can help