Whether you are proactively validating your security posture or are a new CISO assuming responsibility for an existing environment, performing a compromise assessment can give organizational stakeholders the peace of mind that the environment is free from ongoing compromise.

Our security experts will deploy tools at internet egress points and on critical servers and endpoints. We also use our Global Threat Intelligence Platform (GTIP) to identify any indicators of compromise (IOC) in your environment and comparative analysis to identify non-IOC specific anomalous behavior.

In a Compromise Assessment engagement, our security experts will:

  • Identify internet egress points, critical servers and endpoints
  • Implement and configure analysis tools
  • Identify any IOCs, including malware artifacts or network traffic activity
  • Report any red-flag indicators



You Are Here

3.3.x Technical Consulting pillar image

Technical Consulting Service Categories


Our Assessment Services are designed to determine the quality, completeness and maturity of your risk, security and compliance programs and controls.

Learn More

Our planning, audit and testing services focus investment and resources, allowing our clients to evolve effective policies, procedures and security controls that reduce risk and meet changing internal and external compliance issues.

Learn More

We give you access to relevant and timely performance improvement, deep technology knowledge, and flexible resources to develop an infrastructure that is robust and compliant – but flexible enough to deliver business change.

Learn More
Incident Response and Forensics

NTT Security has immediate response capabilities.  If you are currently experiencing a security incident and need immediate assistance contact your nearest regional office.

Learn More