Redshift Cyber SecurityBUSINESS DAY FOCUS 4.0
About Redshift Cyber Security
Redshift is a South African cyber security company and we assist our customers in identifying and mitigating risk as part of a robust strategy for building resilience against modern cyber-attacks.
At Redshift, we believe that true defense comes from an understanding of attack. This reflects in our approach to research, training of our staff and delivery to our customers, honed by cutting edge research into malware, threat actors and attack techniques. Redshift performs deep research into attacker behaviour internationally as well as locally to provide our customers with powerful insight into the risks they face as organisations move into the cloud, AI and digitisation.
Redshift began as a technology start-up in 2015 and has grown significantly in terms of our expert team, capabilities and market reach. We now service customers in South Africa, the United States, Europe and Africa with customer success stories in financial services, insurance, retail, logistics, mining, hospitality and healthcare.
The Redshift team consists of expert penetration testers and cyber security consultants with experience across all industry sectors and in many different technologies. Our team has assisted South African and global organisations in discovering subtle and complex technical weaknesses in their systems, application and networks while translating those into an actionable strategy for building defense against data breaches and compromise.
“True defense comes from an understanding of attack. This reflects in our approach to research, training or our staff and delivery to our customers, honed by cutting edge research into malware, threat actors and attack techniques.”
Redshift believes that the best way to properly defend against modern cyber threats is to accurately simulate real world scenarios using the same tools and techniques as the attackers. Redshift assists organisations with increasing their resilience, to drive improvements in security maturity and provide direction to a cyber security strategy.
For specific risks
Penetration testing involves the testers taking the perspective of an opportunistic attacker or malicious employee to identify vulnerabilities in a target system or application. Penetration tests provide a deep analysis of security flaws within a defined and focussed scope. The result provides insight into the business risks of various vulnerabilities by showing how an attacker can compromise the target and gain access to sensitive information, functionality or otherwise cause damage.
RED TEAM ASSESSMENTS
To test your capabilities
A red team assessment is based on an attacker goal such as “steal money”, “gain access to confidential customer information” or “destroy the factory”. Red team assessments are open scope, goal driven assessments that help an
organisation determine how well prepared they are for a sophisticated, targeted cyber-attack. A red team assessment maps out the pathways an attacker will take through the organisation and assesses the maturity of detection and response capabilities along that path. In this way, the assessment is much more about providing insight into a strategy for building resilience against a collection of threat actors, their tools and tactics.
FOR MORE INFORMATION: firstname.lastname@example.org