default
+

Thank you for contacting us.


One of our expert consultants will review your inquiry.

+

Thank You


We hope you find this resource helpful.
If you have any questions, don't hesitate to contact us.

+

Thank you for contacting us.


One of our expert consultants will contact you within 48 hours.

+

Almost There!

Please fill out the form to complete your
whitepaper download

    +

    Almost There!

    Please fill out the form to complete your
    brochure download

      Purple Teaming

      Purple teaming is a collaborative testing exercise where Packetlabs’ red team works with your internal security operations team (or blue team) to bridge the gap between offensive techniques and response efforts.
      When Packetlabs’ red team collaborates with your blue team, a very unique and custom knowledge exchange happens. Packetlabs’ Purple Teaming service provides insights, resources, and assessments shared in real-time, simulating real-life attack scenarios.

      Uncover weaknesses in your system and reverse engineer defence tactics.

      Packetlabs red team will break defences put in place by your blue team. However, success is not measured by the vulnerabilities we uncover. We measure success by the common goal of improving your organizational security tactics, techniques, procedures (TTPs).

      Packetlabs’ Purple Teaming will help develop better incident response programs to define goals and support during security strategy planning. With evidence-based findings, scenarios tailored to your organizations’ needs, and simulated attacks relevant to your industry vertical, Packetlabs’ Purple Teaming will help optimize your business’ threat intelligence and shed light on possible attack scenarios not yet detected.

      Background

      Packetlab’s Purple Teaming provides an easy-to-follow, step-by-step methodical based approach that includes regular correspondence with your blue team.

      The following list contains the key offerings of the Purple Teaming service:

      network security

      NETWORK SECURITY

      os third party patching

      OS AND THIRD-PARTY PATCHING

      cryptography

      Cryptography

      client side protection

      CLIENT-SIDE PROTECTION

      authentication and authorization

      Authentication

      web application security

      WEB APPLICATION SECURITY

      system configuration

      SYSTEM CONFIGURATION

      database security

      DATABASE SECURITY

      email phishing

      E-MAIL PHISHING

      1. Company and Industry vertical assessment to develop custom attacker scenarios that resemble real-life threats, including a high-level review of security standards, policies and procedures, and SIEM rule analysis
      1. MITRE ATT&CK Framework mapped to your company’s core organizational controls
      1. Collaborative meetings with your blue team to confirm coverage of attack TTPs
      1. Analysis of gaps within AV/EDR Products
      1. Real-time feedback using the MITRE ATT&CK Framework and associated TTPs, simulating real-life attack scenarios which allow your blue team to reverse engineer attacks to optimize the defensive strategy
      1. Report and Consultation outlining key observations, associated risk level and both tactical and strategic recommendation that includes vulnerability management prioritization and patching critical flaws

      What We Deliver

      On-going consultative Red Team engagement and support for your internal Blue Team throughout the entire process

      Direct and collaborative feedback approach to streamline remediation activities and support best practices development

      A MITRE ATT&CK framework heat map and report that identifies any gaps in coverage

      Background

      Related Resources

      May 10, 2016

      PCI PENETRATION TESTING METHODOLOGY

      Packetlabs’ penetration testing methodology is based on industry standards and is primarily aligned with NIST SP800-115 to ensure compliance with most regulatory requirements.

      DOWNLOAD WHITEPAPER
      download_pdf

      101000110010101001001110010110010100010100101111001010100000001

      Background

      Ready for more than a VA scan?®

      Contact us for a free, no-obligation quote on our
      penetration testing services.