Leaders through innovation

Red Team Penetration Testing

What is manipulate? An Introduction

Manipulate is our industry-leading offering: a social engineering penetration testing service, which will demonstrate what can be accessed by potential attackers, and follow-up by helping you reduce the threat that social engineering could impose. To manipulate is the skill of deception, the smiling assassin, the silent attack. It is borne out of the clever manipulation of the human tendency to trust.

The Assessment

Many organisations, particularly international IT companies and Defence-based organisations, regularly contract Red Team services to keep themselves as secure as possible. But these services do not have to be limited to these industries: any work which requires rigorous security in-place could benefit from this form of testing.

Our services in Red Team Penetration Testing are carried out as a project, rather than a standard number of tests or re-tests. We will create a proposal for our work carried out. This proposal will be followed-up with a report after our work with you, detailing our findings and any areas we managed to exploit/access.

Red_Team_Penetration_Testing_graphic

As part of our outreach for manipulate, we have released this short video as an introduction to today's threats of social engineering:

What is Red Team Penetration Testing?

A Red Team test is a penetration testing service from an organisation independent from your own, using a team of white-hat cyber security experts. This is done to test your organisation’s defences, simulating attacks from the real-world.

Compared to standard Penetration Testing, Red Team Penetration Testing:

  • Uses more-highly trained cyber security defence practitioners.

  • Inspects how well your current defences are performing.

  • Uncovers weaknesses that may not be revealed by other penetration tests.

  • Utilises your partners’ vulnerabilities to attempt to gain information on your organisation.

  • Allows your organisation to understand what data/assets would have been compromised by genuine adversaries/cybercriminals.

Request a Quote

Complete the fields below and a member of the team will be in touch to discuss your security requirements.

Events Calendar

2017
October
MonTueWedThuFriSatSun
25 26 27 28 29 30 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5