På Svenska
Hero image

Forensics

Investigate the root cause of the incident

Forensics

A correct incident investigation is crusial

An accelerated digital transformation and a changed threat landscape has led to the number of cybersecurity incidences skyrocketing. In the event of an incident, it is of utmost important to quickly take control of the situation and reduce the consequences of what occurred. Something that is often forgotten, however, is the importance of correctly performing the investigation to learn the reasons for the incident and to collect evidence for a legal investigation.

Content image

Find evidence that holds legal action

Our forensic experts have experience in a variety of cyber incidences and can help your organisation determine what happened, which systems and which type of information has been impacted.

Through a combination of expertise and proven methodology, we can not just help you gain control over the situation and ensure that business operations return to normal, but also provide advice on the best way forward.

Contact us

why sentor?

Capacity, competence and experience

Experience

Since 1999, we have helped affected companies in all kinds of industries to handle, investigate and get back on their feet after various types of security incidents.

Specialists

We have the largest number of technical security experts in Sweden as well as specialists within forensic investigations

Turnkey supplier

With experts in both information security and technical security gathered under one roof, we can investigate and handle incidents of various kinds.

A few words from one of our clients

“We rely on Sentor to check our websites and applications. We are very satisfied with the work that Sentor has performed over the years and the feedback we received. Clearly a trustworthy security partner.”

Christopher AnderssonCIO at Sevenday Finance

Contact us

We offer several contact routes and provide feedback as soon as possible. If you have sensitive information, we ask you to use the encrypted method.