Forensics
Investigate the root cause of the incident
Forensics
A correct incident investigation is crusial
An accelerated digital transformation and a changed threat landscape has led to the number of cybersecurity incidences skyrocketing. In the event of an incident, it is of utmost important to quickly take control of the situation and reduce the consequences of what occurred. Something that is often forgotten, however, is the importance of correctly performing the investigation to learn the reasons for the incident and to collect evidence for a legal investigation.
Find evidence that holds legal action
Our forensic experts have experience in a variety of cyber incidences and can help your organisation determine what happened, which systems and which type of information has been impacted.
Through a combination of expertise and proven methodology, we can not just help you gain control over the situation and ensure that business operations return to normal, but also provide advice on the best way forward.
why sentor?
Capacity, competence and experience
Experience
Since 1999, we have helped affected companies in all kinds of industries to handle, investigate and get back on their feet after various types of security incidents.
Specialists
We have the largest number of technical security experts in Sweden as well as specialists within forensic investigations
Turnkey supplier
With experts in both information security and technical security gathered under one roof, we can investigate and handle incidents of various kinds.
A few words from one of our clients
“We rely on Sentor to check our websites and applications. We are very satisfied with the work that Sentor has performed over the years and the feedback we received. Clearly a trustworthy security partner.”
Contact us
We offer several contact routes and provide feedback as soon as possible. If you have sensitive information, we ask you to use the encrypted method.
+46 8 545 333 00
We answer 24/7info@sentorsecurity.com
For general inquiriessoc@sentorsecurity.com
Use our PGP-key