Search

Security Operations:

If Your Communications Are Worth Protecting During An Incident, Aren’t They Worth Protecting Before?

tech-man-using-laptop

In Sec Ops, Your Comms are Worth More

Mission critical departments like Security Operations, Board Members, Executives and Legal, play an outsized role in the organization. The day to day communications of these personnel are full of insights into how the company operates, where its weaknesses are and how it responds to a crisis.

people-in-a-meeting
woman-coding

What Have You Talked About That You Wouldn’t Want Bad Actors To See?

Hackers aren’t discovered for seven months on average and during that time they actively target the communications channels of these high-value personnel to glean information they could use to do more damage, cripple your response or extort individuals.

Don’t Wait Until Your Breached To Start Protecting

You wouldn’t put your valuables in a safe after your house is broken into, similarly some communications deserve more security day to day.

ArmorText isn’t just for protecting your mission critical communications during an incident, its also there to make sure your most valuable intel is never exposed with a network breach.

business-people-walking

See How Your Incident Response Plan Stacks Up

Grade your plan now

Getting Started

1 of 1

How would you rate you Incident Response (IR) communications plan?
(1 being worst & 5 being best)

First, let's look at how Out-of-Band your solution is.

1 of 3

Does your IR comms tool rely on any On-premise Components?
(e.g. single-sign-on?) Is there network-connected hardware that supports your IR comms tool that would no longer be trustworthy if your network is breached?

Yes
No
I Don't Know

First, let's look at how Out-of-Band your solution is.

2 of 3

Is your alternate tool Dependent on Your Network? Does your IR tool depend on Active Directory, Single Sign On or other authentication tools that would be taken offline if your network is breached?

Yes
No
I Don't Know

First, let's look at how Out-of-Band your solution is.

3 of 3

Is your chosen IR comms tool a Duplicate of Current Tool? Is your chosen IR comms tool a Duplicate of Current Tool?

Yes
No
I Don't Know

Out of Band Risk Level:

Your communications plan could be impacted by a network breach





    Continue Questionnaire

    Now, let's look at how Secure your solution is.

    1 of 3

    Are communications on your IR tool end-to-end encrypted (E2EE)? Don't forget: Encryption-at-rest and encryption-in-transit are not the same as end-to-end encryption.

    Yes
    No
    I Don't Know

    Now, let's look at how Secure your solution is.

    2 of 3

    Can your admins see communications on your IR comms tool?
    Will your comms be exposed to anyone with the proper admin credentials, intentionally or unintentionally

    Yes
    No
    I Don't Know

    Now, let's look at how Secure your solution is.

    3 of 3

    Can your IR comms tool's provider see your communications?
    (intentionally or unintentionally) Can your IR comms tool's provider see your communications? (intentionally or unintentionally)

    Yes
    No
    I Don't Know

    Secure Comms Risk Level:

    Your communications plan could be impacted by a rogue insider





      Continue Questionnaire

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      1 of 3

      Does your IR comms tool give you a way to manage users?
      Define policies?

      Yes
      No
      I Don't Know

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      2 of 3

      Does your IR comms tool give you the ability to retain comms for compliance, regulatory, or legal requirements?

      Yes
      No
      I Don't Know

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      3 of 3

      Does your IR comms tool require self-hosting to enable archive retention?

      Yes
      No
      I Don't Know

      Your Overall Communications Plan Risk is:

      Don't let your response plan fail before it even begins. Let's Get in Touch.





        ArmorText gives you confidence that your most sensitive information is secure.

        Search