We are also there for you when your systems fail. 

Intervening quickly and efficiently when a cyber incident occurs can mean the difference between a minor disruption or a longer and costly interruption resulting in possible reputation damage. 

Incident response team as a service

Easi offers a team (CSIRT) of certified experts to detect, investigate and remediate incidents. With our cyber forensics and recovery support, we draw lessons from the incident to make you even more secure for the future. 

Incident response process

What is Cyber Forensics and when is it useful?

You might find yourself in one of the following scenarios:

  • You have a defective hard drive containing critical information.
  • A virus has devastated your network, infecting dozens of clients.
  • End user data, protected under GDPR, has been compromised, and you don't know how to react or who to inform.
  • You suspect the theft of intellectual property by one of your employees but you don't have proof.
  • Some of your servers are behaving strangely and you cannot find the cause.

With cyber forensics techniques, we can help you understand what is happening, and through incident recovery, we help you fix it. 

Watchlist cybersecurity service by EASI

First aid for ransomware and other attacks

Under attack? Or do you want to know more about Ransomware and what you need to do in case of a cyber incident? 

Cyber Forensics use cases

Data loss

Valuable data was lost, maybe due to a cryptolocker virus, a failed hard drive, or through accidental deletion.

Data theft

Sensitive data was accessed without permission and you are looking for the what, who, when, how, or maybe for proof to take (legal) action.


Important data or services went down under suspicious circumstances and you need help brining them (safely) back online.

Incident response

Forensics analysis

How did the hacker get inside the network? Who accessed these files in the last month? How did the virus spread between clients? And so on. Our Forensics analytics specialists will go after all the details needed to recover and protect your systems for the future. 

Data recovery

We will attempt data recovery from defect or wiped storage media, from crypto locker viruses, or from accidental deletion processes. Our highly skilled professionals will go the extra mile to recover your data as completely as possible to bring your systems back to normal. 

Infrastructure Recovery

We erase viruses, restore systems, close security holes and support you in preventing future incidents. We can advise your IT team on best practices or take over the full security management of your environment in a managed services agreement. 

GDPR Consultancy

With our in-house ISO27001 and GDPR expertise, we recognize when certain actions must be taken and help you remain compliant in your data protection journey. Our CISO as a service offerings can be an excellent choice to get in the right direction. 

These companies already trust our security skills

Centre Neurologique William Lennox
Commune de Tubize
Pharma Technology

Get in touch!