Forensic Analysis

keyboard key with blue fingerprint

From a forensics standpoint, our trained experts will use the most advanced technology and analysis methods.

Our malicious file analysis often leads to the identification of indicators of compromise (IOCs), such as IP addresses or domains communicating with the malware, Microsoft registry key modifications, identification of child or sub-processes that have been launched, code injections, and file names or other attributes of not just the malicious payloads, but the related affected files as well. With this information, we can help you track down other instances of the attack on other systems or put preventative measures in place to block them from happening going forward.

Learn more about our Incident Response Process

View our additional IT Risk Advisory services and capabilities

Cybersecurity Resources

Resource Library

Explore our cybersecurity resource library, including case studies, whitepapers, best practices and expert thought leadership.

Learn More >

Our Thoughts On

Schneider Downs’ experts deliver analysis about the cybersecurity trends that impact our clients and organizations of all types and sizes.

Learn More >

contact us

Map of Pittsburgh Office

One PPG Place, Suite 1700
Pittsburgh, PA 15222

[email protected]
p: 412.261.3644     f: 412.261.4876

Map of Columbus Office

65 East State Street, Suite 2000
Columbus, OH 43215

[email protected]
p: 614.621.4060     f: 614.621.4062

Map of DC Office
Washington, D.C.

1660 International Drive
McLean, VA 22102

[email protected]
p: 571.380.9003