
11
Product information
Red teaming reveals how
vulnerable your organization truly is to actions performed by professional
groups and cybercriminals. In doing so, our Red Team attempts to access
sensitive information in any way and as undetected as possible. Attacks are
carried out using all possible technical means - from open-source intelligence
to IMSI catchers and social engineering.