Red Team Assessments



Test your security controls before someone else does


   
Red Team Assessments: The Basics

A Red Team Assessment is a zero notice simulation of real-world adversaries performed over the course of several months. During this assessment, all attack vectors are allowed (including network, application, phishing and physical). The point of a Red Team Assessment is to assess the effectiveness of your organization’s security operations and technical security controls, especially the ability to detect and effectively respond to an ongoing intrusion. It only takes one small oversight to render a critical part of an organization’s security infrastructure ineffective, only a Red Team assessment can effectively identify these gaps.

What is a "Red Team"?

In short, a Red Team is a highly skilled group of hackers. But instead of working for themselves with criminal motives, they work for your organization to help you identify gaps in your security infrastructure. The Red Team attacks a company’s network by any means necessary and without strict time or scope limitations and—just like the real bad guys— their goal is to gain access to an organizations most sensitive data while remaining undetected. 

The Red Team uses the same methodology as an adversary during a targeted attack in order to breach your network. If they are detected, your organization should react as if this were a real attack to gauge the effectiveness of your incident response procedures. If they are not detected, we will work together to figure out why and how to fortify your security processes and controls against future attacks.

Penetration Test vs. Red Team Assessment: What’s the difference?

On a very basic level, Penetration Tests can be looked at as assessing and protecting against potential “smash-and-grab” attacks (loud, sudden, brute-force attacks), whereas Red Team Assessments do the same for “cat burglar” attacks (stealthy, hard to detect, usually targeted attacks). 

Another difference is exactly what these two types of assessments are trying to accomplish. Since Penetration Tests are limited in scope and time, they are great for identifying vulnerable systems, networks, and systemic security issues. In contrast, the goal of a Red Team Assessment is to test the company’s detection and response capacities. Upon breaching the system by any means necessary, the Red Team will try to stay there as long as possible without being detected, and while collecting as much sensitive information as possible.

Why is a Red Team Assessment Important?

NTT Com Security’s Offensive Security team has conducted hundreds of penetration testing and Red Team engagements over the past few years. More often than not, our team successfully breaches the client’s system. But the point is not whether or not your system or a particular security control can be breached; but that you are continuously testing whether you can detect and respond to those breaches. 

Testing your security operations, controls, and processes should be an ongoing process that results in continuous improvement and protection. Utilizing a Red Team Assessment—or even better, utilizing it consistently—is a valuable way to protect your company from the breaches your technology can’t see coming.

Offensive Security: Introducing the Red Team

As a trusted partner, NTT Com Security takes penetration testing to the next level with our Red Team. The NTT Com Security Red Team simulates real, advanced threats by breaking into the companies' infrastructure and using any number of attack vectors over a course of 1-6 months at zero notice.

Read More >

Speak to a Red Team Expert

Do you have a security question or inquiry about our Red Team offerings? Contact us to speak to one of our Red Team experts directly.

Contact us >

Red Team in the Press

Chris Camejo, Director of Threat and Vulnerability Analysis, discusses the importance of utilizing a Red Team in an exclusive interview with Security Magazine.

Hats of Many Colors: How Ethical Hackers Could Benefit Your Enterprise

Read the full article in Security Magazine >