Analysis & Support
Compromised Website: Your network is attempting to connect to a site that was once serving malware (but is no longer actively doing so). We believe it’s prudent to stay away, but you may whitelist the site if you prefer.
Malware Distribution: We stopped an attack while it was in progress. Your network is safe, and if we can, we will let you know which machine was attempting to contact the malware-affiliated site. There will be no further action required.
Malware: We find that malware has been installed on one of your machines. Strongarm quarantines and disarms it, then notifies you. We will protect the network and device and provide you with relevant details to help you respond.
Malvertising: We stopped one of your users from visiting a website that would have attacked their browser. We stopped the attack and, because the user wasn’t doing anything wrong, there’s no action to take. If we can, we will provide you the IP address, so you can run a scan if you like.
Using the Discussion feature, with every alert, our team will analyze what happened and advise what to do next. This allows you to make rapid, informed decisions on how to respond. Strongarm also maintains a historical record, so that you can review previous issues and how they were resolved.