OUR PEOPLE ARE INTENSELY FOCUSED ON SECURITY

Falling somewhere between IT engineers and sophisticated hackers, our Applied Research team members aren’t your typical security experts. Simply stated, no one is better qualified to assess your situation and help you effectively respond to it.

RED SKY SECURITY POSTURE ASSESSMENT

When it comes to security, there’s no such thing as too much information. That’s why our thorough risk assessment includes ethical hacking and penetration testing. The result is a clear understanding of vulnerabilities and measurably safer systems.

Also, not all assessment tests are the same. When determining who you should use, it’s good to know their background. Among many other accomplishments, our people:

  • Published the first iOS jailbreak exploits
  • Helped the FBI with an iOS forensics toolkit
  • Have assisted Apple, Symantec, Cisco, Microsoft, IBM, and others in vulnerability research and exploitation disclosure
  • Are nationally recognized conference speakers

HACKERS DON’T MISS ANYTHING. NEITHER DO WE.

When a threat can come from anywhere, you have to look everywhere. This could explain why Red Sky not only evaluates at everything you’d expect, but goes far deeper by examining every system, protocol and process. Our comprehensive Security Posture Assessment involves:

  • Vulnerability Assessments
  • External and Internal Posture Assessments
  • Penetration Testing
  • Policy Review
  • Wireless Security Assessment
  • Social Engineering
  • Physical Security Assessment

Penetration Testing: The safe way to exploit vulnerabilities

If you have an IT system, you have vulnerabilities. Identifying them, without causing any harm to your data or systems, is the purpose of penetration testing. Red Sky first defines a trophy, or specific objective, and then designs the test in an optimal way to reach it. A successful test will identify weaknesses along with any defenses that may have been compromised.

Vulnerability Scan: An automated system for identifying weaknesses

Through the use of software, vulnerability scanning automates the search for security flaws by comparing your systems with a large database of known weaknesses. Red Sky’s solution tests your systems for any of these flaws and creates a comprehensive report detailing ways you can more thoroughly tighten your network’s security.

Ethical Hacking: Friendly attacks to help you avoid the unfriendly ones.

Not all hackers mean you harm. Red Sky’s ethical hackers are highly trained computer systems experts who attempt to breach your defenses in order to protect you from malicious attacks. We then document exploitable flaws and shortcomings and provide clear advice on how to address them.