Cyber Red

As an organization, you want to be certain that your security measures are effective. To validate this, we regularly perform penetration tests. We do this through Black box, Grey box, and Crystal box testing. The difference lies in the amount of information provided by the organization beforehand. In a Black box test, no information is shared, while in a Crystal box test, design documentation and source code can be shared, allowing for more in-depth validation in a shorter timeframe.
Woman holding tablet
Decorative

Cyber Red Services

Web Penetration Testing

To periodically validate whether web pages accessible via the internet are sufficiently protected against external attacks, we perform Web penetration tests. Pages can be part of a website or specific web application. We follow the OWASP Web Security Testing Guide.

Certification: OSCP, OSWE

decorative
App penetration testing

To periodically validate whether mobile applications are sufficiently protected against external attacks, we perform App penetration tests. We follow the OWASP Mobile Security Testing Guide.

Certification: OSCP, OSEP

decorative
AD and AAD penetration tests

To periodically validate whether the Active Directory and/or Azure Active Directory environment is sufficiently protected against specific attacks aimed at gaining the highest possible privileges in the shortest possible time, we perform (A)AD penetration tests.

Certification: OSCP, OSEP

decorative
API penetration testing

To periodically validate whether internal and external Application Programming Interfaces used by software programs to exchange data are sufficiently secured, we perform API penetration tests. We follow the findings from the OWASP API Security Project.

Certification: OSCP;, OSEP

decorative
OT Penetration Testing

To periodically validate whether OT devices with often specific software are protected against attacks, we perform OT penetration tests. In addition to generic penetration tests, we follow the OWASP Firmware Security Testing Methodology.


Certification: OSCP, OSEP

decorative
Physical Penetration Testing

To periodically validate whether physical security measures protecting access to private buildings and (technical) spaces are sufficient, we perform Mystery Guest visits. Gaining physical access to the organization can be a potential part of an attack vector.

decorative
Consultancy

Our foundation is built on providing sound and independent advice. It's crucial that we maintain our autonomy, remain curious and eager to learn about the client's business processes, and maintain transparent communication with the client.

decorative

Improve Your Security Posture with Our Services

The foundation of our service begins with interest and deep understanding of your organization. This is the only way your organization can be properly protected.

Cyber Blue

Monitor critical business assets 24/7 against external and internal attacks with knowledge of business processes and attack strategies.
arrow

IAM

Manage digital identities and access levels of employees, partners, and suppliers, minimize risks, and promote productivity.
arrow

User Awareness

Increase employee awareness through regular education campaigns resulting in lasting behavioral change.
arrow

GRC

Manage your security posture based on risks, standards, and measures. Advise on regulations and internal and external audits.
arrow

Network Security

Monitor network traffic for anomalous patterns, detect and neutralize attacks, and regulate network access to reduce the risk of unauthorized access.
arrow