default
+

Thank you for contacting us.


One of our expert consultants will review your inquiry.

+

Thank You


We hope you find this resource helpful.
If you have any questions, don't hesitate to contact us.

+

Thank you for contacting us.


One of our expert consultants will contact you within 48 hours.

+

Almost There!

Please fill out the form to complete your
whitepaper download

[contact-form-7 404 "Not Found"]
+

Almost There!

Please fill out the form to complete your
brochure download

[contact-form-7 404 "Not Found"]

Purple Teaming

Purple teaming is a collaborative testing exercise where Packetlabs’ red team works with your internal security operations team (or blue team) to bridge the gap between offensive techniques and response efforts.
When Packetlabs’ red team collaborates with your blue team, a very unique and custom knowledge exchange happens. Packetlabs’ Purple Teaming service provides insights, resources, and assessments shared in real-time, simulating real-life attack scenarios.

Uncover weaknesses in your system and reverse engineer defence tactics.

Packetlabs red team will break defences put in place by your blue team. However, success is not measured by the vulnerabilities we uncover. We measure success by the common goal of improving your organizational security tactics, techniques, procedures (TTPs).

Packetlabs’ Purple Teaming will help develop better incident response programs to define goals and support during security strategy planning. With evidence-based findings, scenarios tailored to your organizations’ needs, and simulated attacks relevant to your industry vertical, Packetlabs’ Purple Teaming will help optimize your business’ threat intelligence and shed light on possible attack scenarios not yet detected.

Background

Packetlab’s Purple Teaming provides an easy-to-follow, step-by-step methodical based approach that includes regular correspondence with your blue team.

The following list contains the key offerings of the Purple Teaming service:

network security

NETWORK SECURITY

os third party patching

OS AND THIRD-PARTY PATCHING

cryptography

Cryptography

client side protection

CLIENT-SIDE PROTECTION

authentication and authorization

Authentication

web application security

WEB APPLICATION SECURITY

system configuration

SYSTEM CONFIGURATION

database security

DATABASE SECURITY

email phishing

E-MAIL PHISHING

  1. Company and Industry vertical assessment to develop custom attacker scenarios that resemble real-life threats, including a high-level review of security standards, policies and procedures, and SIEM rule analysis
  1. MITRE ATT&CK Framework mapped to your company’s core organizational controls
  1. Collaborative meetings with your blue team to confirm coverage of attack TTPs
  1. Analysis of gaps within AV/EDR Products
  1. Real-time feedback using the MITRE ATT&CK Framework and associated TTPs, simulating real-life attack scenarios which allow your blue team to reverse engineer attacks to optimize the defensive strategy
  1. Report and Consultation outlining key observations, associated risk level and both tactical and strategic recommendation that includes vulnerability management prioritization and patching critical flaws

What We Deliver

On-going consultative Red Team engagement and support for your internal Blue Team throughout the entire process

Direct and collaborative feedback approach to streamline remediation activities and support best practices development

A MITRE ATT&CK framework heat map and report that identifies any gaps in coverage

Background

Related Resources

May 10, 2016

PCI PENETRATION TESTING METHODOLOGY

Packetlabs’ penetration testing methodology is based on industry standards and is primarily aligned with NIST SP800-115 to ensure compliance with most regulatory requirements.

DOWNLOAD WHITEPAPER
download_pdf

101000110010101001001110010110010100010100101111001010100000001

Background

Ready for more than a VA scan?®

Contact us for a free, no-obligation quote on our
penetration testing services.