Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Consulting

Hall 7 / Booth Number 7-101

Red Teaming

Product Expert

south_east

Video

south_east

Categories

Institutes and initiatives Application security Cloud (computing) security Cyber-physical systems security Endpoint security Network security Physical IT-security Server-based computing Web application security E-government Financial Sector Industrial IT security Energy and water supply Data center security Authorities and associations Education/training/qualification Critical Infrastractures Awareness Data protection, data security Consulting IT security Vulnerability and patch management Penetration tests Threat analysis APT protection Data leakage/loss prevention

Key Facts

  • Our team of red team auditors is well trained and highly experienced at conducting exercises in a ‘real’ environment to assess the security level of information systems and improve organisations’ detection and response mechanisms.
  • Our red teamers already realised missions in several industries such as media, banking, government and OT.

Product Description

Carried out by a team of ethical hackers, a red team is designed to test your organisation’s cyber defences in the most realistic way possible. A typical exercise involves simulating attacks against critical functions and systems (people, processes and technologies) without informing your security team.

The red team can work alongside the blue team to combine offensive and defensive approaches, creating purple teaming.

Services we offer:

  • Devising an appropriate ‘plan of attack’ to match your organisation’s unique needs
  • Exploitation of vulnerable services exposed on the web
  • Phishing campaign
  • Compromising your internal network
  • And more

Optional:

  • Physical intrusion
  • Social engineering
... read more

Watch our product video

external video thumbnail
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.