Porthas Inc.
Cybersecurity & Incident Response·Operated by Proven Data

3,000+ incidents resolved. When you're under attack, we're already responding.

Ransomware containment in under 22 minutes. 80%+ recovery without ransom payment. 15 years of IR expertise combined with an AI-driven security platform built for MSPs.

3,000+ incidents resolved80%+ without ransom<22 min containment4.9/5 Trustpilot

Certifications & compliance

NIST CSF AlignedSOC 2 CompliantHIPAA ReadyInsurance Panel ApprovedBreach Counsel ReadyISO 27001 GuidedOFAC Compliant

Four pillars of cybersecurity response

From the moment of attack through remediation and long-term protection — plus an AI-driven platform for partners who want to deliver managed security services.

Incident Response & DFIR

<22 minutes to containment

24/7 emergency response — live answer, no voicemail, no escalation delays

AI-accelerated digital forensics and evidence collection

Remote deployment via Lynx platform agent — no on-site required

Attorney-privilege compatible documentation and chain-of-custody standards

NIST CSF and ISO 27001 aligned reporting — insurance and legal ready

Ransomware Recovery R&D Lab

80%+ recovery without ransom payment

In-house R&D lab researches 150+ ransomware variants — ongoing, proprietary

Shadow copy carving, backup fragment reconstruction, DB and VM specialized recovery

Exhausts every decryption vector before recommending payment — often faster than ransom cycle

Post-settlement bad decryptor resolution — flat-fee support block included

Key extraction and data corruption repair on failed decryptors

Cyber Settlement & Negotiation

83% average discount from initial demand

AI trained on 3,000+ historical negotiation records — pricing patterns, escalation tactics, settlement thresholds

Deep threat actor profiling: who they are, what they accept, how they escalate

Full communications management — threat actor comms, proof-of-life, OFAC screening, legal review

OFAC-compliant settlement support with documentation for insurance and counsel

Settlement documentation included; post-settlement decryptor failures covered

Remediation & Hardening

48-hour average restoration time

Rapid system rebuild with hardened infrastructure from prebuilt virtualized systems

Deployable in hours — on-site or remote, client preference

Active Directory and identity infrastructure recovery

Security hardening applied during rebuild — not after

Vulnerability closure and posture improvement report delivered at completion

The Lynx Platform

9-module unified security platform for MSPs and MSSPs — resell to clients or co-manage alongside your existing stack.

72% faster triage44% less alert noise<22 min to containment
MDR / Endpoint Defense
Real-time endpoint telemetry with guided analyst workflows
Attack Surface Management
Continuous passive external perimeter scanning
Threat Intelligence & Dark Web
Credential, domain, and IP monitoring across dark web forums and breach data
Incident Response Module
IR agent deployment, forensic collections, and case management
Identity Threat Detection (ITDR)
MFA bypass, impossible travel, password spray, and privilege abuse detection
Supply Chain Security
Continuous third-party vendor risk assessment
Backup & Recovery
Ransomware-resilient cloud backup with per-device health monitoring
SIEM & Compliance
ATT&CK-aligned detection rules and compliance attestation
Vulnerability Management
Risk-first prioritization and remediation tracking

The proof is in the numbers

15 years and 3,000+ incidents, measured.

3,000+
Incidents resolved since 2011
80%+
Ransomware recovery without paying ransom
<22 min
Average time to containment
83%
Average discount from initial ransom demand
48 hrs
Average time to restore operations
4.9 / 5
Trustpilot rating
150+
Ransomware variants researched in-house

How we respond to an incident

The experience your clients get from the moment of attack to restored operations.

1

Incident reported

24/7 emergency line — live answer, no voicemail, no escalation queue. Immediate triage begins on first contact.

2

IR team deploys remotely

Lynx agent pushed to the affected environment. Containment and network isolation begins within 22 minutes on average.

3

Forensic investigation

Evidence collection, chain-of-custody preservation, root cause analysis. Insurance-ready and attorney-privilege compatible documentation.

4

Recovery or settlement

Every decryption vector exhausted before negotiation is recommended. 80%+ of cases resolved without ransom payment.

5

Remediation + hardening

Vulnerability closure, Active Directory recovery, security posture hardening report. Average restoration: 48 hours.

What you earn as a partner

Refer ransomware cases, co-deliver incident response, or resell the Lynx platform — three distinct revenue streams.

Referral
Commission on IR engagements

Refer clients experiencing a ransomware attack, breach, or DFIR need. Our team handles the response end-to-end. You earn commission when the engagement closes.

Co-delivery
Revenue share per engagement

You own the client relationship and co-brand the engagement. Our team provides the technical incident response. Revenue split based on delivery scope agreed in advance.

Platform resell
Margin on Lynx seats

Resell the Lynx security platform to your clients at wholesale pricing. Multi-tenant architecture built for MSPs and MSSPs. Monthly recurring revenue.

Commission rates and revenue share terms are disclosed during partner onboarding.

Industries that partner most on cybersecurity

Ready to expand your service catalog?

Join the Porthas partner program and start offering cybersecurity, data recovery, and privacy services under your brand — or ours.

No cost to apply · Reviewed within 2 business days · No commitment required