Unique Expertise for Defending Against & Responding to Critical Security Incidents
Mandiant helps its clients secure their networks against threats and resolve computer security incidents of all kinds. Mandiant's consultants hold top government security clearances, have authored a number of books and are regularly quoted by leading media organizations.
Mandiant Professional Services
Mandiant offers a full range of security services designed to help organizations prepare for and respond to security incidents:
Mandiant investigates and resolves computer security events ranging from single system compromises to enterprise-wide intrusions by advanced attack groups that span hundreds of thousands of systems. Mandiant focuses on helping clients recover from each incident while minimizing the impact of the event on the organization. Learn more.
This unique offering applies Mandiant's specialized knowledge of advanced attackers’ tactics to evaluate whether they are currently operating undetected in an environment or whether they have been there in the past. Learn more.
Mandiant evaluates organizations' computer systems, applications, and networks for security vulnerabilities that are most likely to be leveraged by attack groups to compromise their environment. All findings are rated based upon their risk, probability of exploitation and potential business impact. Learn more.
Mandiant supports legal teams that rely on electronic evidence to support their cases. In addition to preserving, collecting, analyzing and processing electronic evidence, Mandiant consultants also participate in depositions and provide expert witness testimony. Learn more.
Security Operations Design & Development
Mandiant assists organizations to establish and improve their computer incident response team (CIRT) capabilities. Services include review of current processes, capabilities and technology against leading practices as well as training and consulting services to create and grow CIRTs. Learn more.
Unique Experience & Capabilities
Mandiant consultants draw on a range of unique skills, experience, threat intelligence and proprietary technology to deliver a complete portfolio of computer security consulting services:
A dedicated malware team that reverse engineers malicious software and researches the latest exploits attackers are using.
Profiles of key attack groups including their tools, practices and objectives along with corresponding Indicators of Compromise (IOC).
Technology to automate investigative tasks & rapidly assess network traffic and host-based artifacts across hundreds of thousands of systems.
Technical & investigative skills developed over the course of hundreds of investigations.
Experience providing guidance and advice on the business impact of computer security decisions.