Cybersecurity
IT and Cybersecurity
Asset-based expertise

Compromise Discovery

Hunt for compromissions from your Information System
Book a demo

Your challenge

Computer attacks have grown exponentially, targeting both businesses and governments.​

Benefits of Compromise Discovery

Agentless

Easy to deploy at scale. No specific agent to install.

Threat analysis

Identify risky behaviors and suspicious traces that may indicate an ongoing or past attack.

Compliance validation

Provide an accurate analysis of the compliance of your IT assets.

"We developed the Compromise Discovery solution in response to a question frequently asked by our clients following our security assessments : "I now know that I am at risk, but is it already too late ?". Our approach has allowed us to identify discrete attacks on our clients' most at-risk perimeters : for example, the presence of banking malware on a branch treasurer's workstation, remote access to an executive assistant's environment, or the presence of unsecured remote access solutions left on a critical server by a supplier."

Jamal Basrire, Cybersecurity Partner, PwC France and Maghreb 

Pricing

Initial Assessment

  • Definition of the perimeter of the IS machines to be analyzed
  • First collection of data necessary to detect a compromise
  • Analysis limited to 500 endpoints
  • Detection of suspicious behaviors & weak signals
  • Delivery of a report with a global view of the IS

20.000€

Discovery Pro / SME - ISE

Initial Assessment + annual subscription

  • Definition of the perimeter of the IS machines to be analyzed 
  • Initial collection + monthly collection for one year 
  • Analysis limited to 500 endpoints 
  • Detection of suspicious behaviors & weak signals 
  • Delivery of an initial report with a global view of the IS, followed by a monthly update allowing to follow the evolution

38.000€

Discovery Premium / SME - ISE

Initial + subscription + incident response retainer

  • Definition of the scope of the IS machines to be analyzed
  • Initial collection + monthly collection for one year
  • Analysis limited to 1000 endpoints
  • Detection of suspicious behaviors & weak signals
  • Delivery of a report with a global view of the IS
  • Access to our Incident Response service (available 7 days a week), first 2 days of analysis included
  • Access to our Threat Watch platform

50.000€

Discovery Expert / SME - ISE

Ransomware White Paper

Ransomware attack : how to deal with it ?

Global Economic Crime and Fraud 2022

How do companies react to the increase in external fraud?

Global Digital Trust Insights 2022

Simplify and optimize your cybersecurity

These products might interest you

Can't find what you're looking for?

© 2023 PwC. All rights reserved. PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity.
Please see www.pwc.com/structure for further details.

The PwC Store uses open source software.