

Frequently Asked QuestionsQ: Will discovery activities impact our production systems?
A: No. ARC.Discovery is designed to be completely passive, so it observes traffic without touching production devices or protocols.Q: How quickly can we see initial results?
A: You’ll see an initial asset inventory in 24-48 hours, with full discovery typically completed in 2-3 weeks depending on network complexity.Q: What data do you need from our side?
A: Just network architecture diagrams, VLAN configurations, and read-only access for tap/span deployment. No credentials or device access required.

Key Questions AnsweredQ: How do you make sure scanning won't disrupt operations?
A: We only scan in pre-approved maintenance windows, with plant teams present and rollback procedures ready. No surprises, no production risk.Q: What do we get in the remediation roadmap?
A: A clear, prioritized action plan with cost estimates, resource needs, maintenance alignment, and business impact for every recommendation.Q: How often should we reassess?
A: Typically once a year for full reviews, with quarterly refreshes for high-risk environments or major infrastructure changes.




Safety and Methodology QuestionsQ: How do you ensure production systems aren't impacted?
A: We don't test blindly. Every exploit is validated in ARC.Lab first, then executed only in approved windows with full oversight and rollback support.Q: What's the difference between red team and purple team testing?
A: Purple teaming pairs offensive testing with defensive collaboration, so you strengthen detection, response, and resilience at the same time.Q: How long does a typical penetration test take?
A: 4-6 weeks from planning through validation, controlled testing, and final reporting.

Exercise Structure and BenefitsQ: How realistic are the crisis scenarios?
A: Very. We build them from actual threat intelligence and your operating environment, so the pressure feels real because it is.Q: How often should crisis exercises be conducted?
A: Quarterly tabletop exercises and annual full-scale simulations are the standard. If your threat exposure is higher, run them more often.Q: What teams should participate in exercises?
A: IT, OT, executives, legal, communications, and any external partners who would be involved when a crisis hits.