ANALYSIS ON DEMAND

Advanced analysis for advanced threats.

Call on our skilled cyber experts to analyze your threat data and provide high-value, actionable intelligence back to your team:

  • Attack reconstruction
  • Threat prioritization
  • Campaign correlation to known APTs
  • Mitigation planning

Analysis on Demand (AOD)

Analysis on Demand (AOD) is a unique service that enables clients to securely transmit threat related data to Leidos for analysis. Our world-class Security Intelligence Center analysts provide a detailed report outlining their findings and recommendations for mitigation.

Maximize Your Resources

Our team can offer surge support to perform deep-dive analysis while your team stays focused on determining a mitigation plan and tracking ongoing incidents. Analytical support tasks include malware reverse engineering, digital forensics, and advanced technology development. The objective of the AOD service is to assist clients with tactical data analysis needed to reconstruct an attack, identify threats, prioritize the defender’s responses, and develop and implement remediation strategies.

Service benefits include:

  • Analysis developed utilizing the Cyber Kill Chain® framework
  • Access to Leidos analysts’ subject matter expertise
  • Additional threat insights and enterprise mitigation guidance

Report components include:

  • Quantification of the event data
  • Differentiation between threats and non-threats
  • Prioritization of identified threats
  • Alignment to known Advance Persistent Threats
  • Identification of related indicators
  • Recommend course of action
  • Areas to investigate
  • Mitigation plan

Access Highly Skilled Analysts

Gain access to highly skilled analysts with expertise in the following areas:

  • Digital Forensics
  • Malware Reverse Engineering
  • Host Intrusion Prevention Systems (HIPS), including Host Firewalls
  • Host Anti-Virus (AV)
  • Network Intrusion Prevention & Detection Systems (IPS/IDS)
  • Security Information & Event Managers (SIEM)
  • Web Proxies
  • Remote Access Gateways
  • Firewalls
  • Identity and Access Management platforms
  • Full Packet Capture (FPC) platforms
  • Email Filtering (spam, reputation, AV)
  • Enterprise forensics platforms
  • Custom network monitoring applications

Talk to a cybersecurity expert today.

 CONTACT US