Makeing sense of IT:Security
The Red Team Approach is a tool that enables small and medium-sized enterprises (SMEs) to simulate real cyber attacks.
Penetration testing focuses on the technical analysis of your systems and forms the basis of an effective hardening process.
The Assumed Breach scenario allows you to simulate an attack with a focus on the post-breach phase in the corporate network.
The Egress / C2 test examines which protocols, ports and channels a malicious attacker can use to establish command and control (C2) connections from inside to outside.
The slogan of the company is: Challenging Defences and Developing Defenders. My vision with RedOps is to establish Red Teaming and Red Team Services more strongly in Austria and to develop them continuously. Small and medium-sized enterprises in particular often do not know how to react in the event of a cyber attack or what is needed to preventively arm themselves against cyber attacks.
With my services such as the Red Team Approach, I also want to enable small and medium-sized enterprises (SMEs) to simulate realistic cyber attacks, train the defenders in the company and thus build up strong resilience against cyber attacks step by step.
I am convinced that IT security plays an important role for companies of all sizes today and especially in the future. The complexity of cyber attacks is constantly increasing and it is becoming more and more difficult for companies to defend themselves against them. I live the philosophy that IT security is not a product, but a process that must be continuously advanced and improved step by step. As an enthusiastic martial artist, I see many parallels to cyber security. In both areas you need a strategy, regular training, discipline, continuity, perseverance, willpower, etc.
Where competitors are more interested in selling products and licences, I want to sensitise and successively strengthen companies for cyber attacks with my independent and objective services such as penetration testing or the Red Team Approach.
My mission with RedOps is to educate organisations on the key differences between Penetration Testing and Red Teaming or the Red Team Approach. I want to help companies improve their own technical IT security level through penetration testing. At the same time, I would like to introduce my clients to the added value of a real cyber attack simulation using the Red Team Approach or Assumed Breach and train their internal defenders.
I see myself as a sparring partner in the area of offensive security, who responds individually to the needs of companies and specifically demands, promotes and develops their competences and skills in the area of IT security.