Redaxer provides unique adversarial perspectives into your systems and environments offering multiple consulting services including
All our services are fully modular, so you can focus the scope of the engagement on specific systems choosing the right activity and we will tailor our service to your business needs, as well as your security priorities. Still unsure? Review our service comparison matrix or talk to an expert. Do not worry, we will work with you to fully understand your organization's needs, goals, and desired outcomes.
SERVICES COMPARISON MATRIX
Below matrix’s show different modular activities that can be fully customized and added to the selected engagement.
Vulnerability Assessment | Penetration Testing | Red Team Operations | Adversary Simulation | |
---|---|---|---|---|
Workstation and Server Build Review |
|
|
|
|
Application Security Assessment (Web, Desktop and Mobile) |
|
|
|
|
Network Security Assessment |
|
|
|
|
Cloud Security Assessment |
|
|
|
|
Code Review |
|
|
||
Embedded Devices and IoT Security Assessment |
|
|
||
SCADA/ICS Security Assessment |
|
|
||
Wireless Security Assessment |
|
|
|
|
Open Source Intelligence (OSINT) |
|
|
|
|
Phishing Campaign |
|
|
|
|
Physical Intrusion |
|
|
|
|
Social Engineering |
|
|
|
|
Custom Evasion techniques |
|
|
|
|
Exploit Development |
|
|
|
|
Tailored Malware |
|
|
|
|
Vulnerability Research |
|
|
|
|