- Forensic analysis is carried out following a compromise or in the event of
suspicion of intrusion.
- The main objective of this IT security service is to materialize
computer evidence and thus precisely trace the modus operandi of
the attacker, the origin of the compromise and the damage caused by this.
© Copyright