Red Teaming
Red Teaming is a service designed to simulate a real-world cyber attack as closely as possible. Red Teaming can be used to assess the security posture of both your digital and physical security controls, and is often combined with social engineering services as part of physical security assessments.
What Gets Tested?
Conducting a Red Team assessment against your digital and physical security controls enables you to understand the likelihood of compromise in a real-world attack scenario and address these areas before they become a problem, and allows you
to see how your own security resources react to a potential threat. Our team of CREST-certified penetration testers will assess your controls following the below process:
​
-
Reconnaissance to gather valuable information ahead of the project using both Open Source Intelligence gathering (OSINT) and, if applicable, physical surveillance
-
Infiltration to act on information collected during the reconnaissance phase to attempt to breach your digital and/or physical perimeter in an attempt to exfiltrate sensitive data or documents
​
Following the infiltration phase, the exact process followed will have been determined during initial scoping discussions and establishment of rules of engagement.


