BLUE, RED

AND PURPLE

TEAMS

The Berghem experts who form the Red, Blue and Purple Teams are prepared and continuously updated in order to apply best efforts in attacking and defending environments – both virtually and physically.

Assess your maturity

and responsiveness!

RED TEAM

Experts in offensive security who are dedicated to attacking and finding security breaches, as well as possibilities to exploit them.

Conducting high performance tests according to previously outlined objectives.
Simulation of highly-realistic attacks carried out in the real world.
Customized tests that seek to assess the level of organisational maturity in crisis situations that are based on their procedures for alerting and responding to incidents.

Beef up your security

and acquire resilience!

BLUE TEAM

Multifaceted team that works with the customer in structuring processes, deploying technology and developing people to minimize the impact of security incidents and maximise business recovery capabilities.

We update and implement policies and procedures related to security, an incident response plan and disaster recovery:

  • Defining processes, tests and possible audit trails;
  • Establishing metrics and proper indicators;
  • Identifying and repairing possible deficiencies;
  • Comprehensive and easy-to-understand risk analysis and threat modelling across technical and executive areas;
  • Comprehensive and easy-to-understand risk analysis and threat modelling across technical and executive areas;

PURPLE TEAM

Merging both teams’ perspectives, our experts will work synergistically in an effort to reach an even higher level of security within the organisation, with attack and defence routines exploited to the maximum, reflecting on how to reinforce defence tactics, techniques and procedures (TTP). All of this explained by our consultants with the intention of attaining an even higher level of security within the organisation.

Establishing metrics and proper indicators;
Identifying and repairing any deficiencies;
Comprehensive and easy-to-understand risk analysis and threat modelling across technical and executive areas;
Training on best practices for cyber security, fraud prevention and secure development – among other relevant areas – to employees and outsourced workers.

Attack simulations

BLUE TEAM

INCIDENT RESPONSE TIME
PROCESSES
PROCEDURES
RESPONSIVENESS

RED TEAM

Advanced cyber attack on remote access channels (internet, wireless, modem, mobile, etc.);
Social engineering actions (phishing, malware and other malicious artefacts);
Invasion from trusted networks (remote offices, partners, customers, suppliers, VPNs);
Normal and distributed denial-of-services attacks (DoS and DDoS).

ITEMS

ASSESSED IN

THE SIMULATION

Identification of attack categories
Ability to generate audit records
Mitigation, reduction or acceptance of risks
Attack bases
Assessment of response times
Learning ability

Schedule a meeting

Rely on Berghem to assist you in keeping the information and assets of your company, customers, executives and other stakeholders secure.
[email protected] +55 11 2391-5745