RED CURSOR
  • Home
  • Services
  • About
  • Contact
  • Blog
Picture
Your point for security
"Security is not about bandaid fixes.
It is not about applying a missing patch.

It is about fixing the problems at the source
​It's about fixing procedures and policies."

Welcome to  Red Cursor.

There is one thing we do (and we do it well); we specialise in boutique security consulting. Whether that be penetration testing, incident response, security architecture and design reviews, or ensuring that whatever you are releasing to the public can only be used for its intended purpose. With over 20 years of experience helping secure over 800 businesses, you are in good hands.  Our world class consultants are all CREST certified and the efficacy of our methodologies, renowned.

Our mission is to provide our clients with the most precise and professional consulting services conceivable.  Click contact to learn more about how we can help your business, and one of our consultants will be in touch shortly.

01 REACTIVE

Incident Response

Just been hacked? Experiencing unusual activity or symptoms? Incident and forensics are our specialty.  Whether it be your main ecommerce site that's been hacked or some 0day malware on your network. Our incident response consultants are highly trained in log analysis, memory forensics and malware reversing. We will help you identify:
  • The vulnerability used to break in
  • What the attacker managed to do or steal
  • What to do next
  • How to navigate the GDPR laws
  • How to close off the issues and protect yourself.
Our engagements work as either a day to day ad hoc investigation or on a retainer based model where you have us on call after an initial review and identification of your biggest risks.
Learn More

02 PROACTIVE

Penetration Testing

Penetration testing is simulating a malicious attacker with intent to identify security vulnerabilities in a system. With 15 years of penetration testing expertise we can promise you that whatever you need testing we can handle it.  All our testers are CREST certified and senior consultants. We have experts in all areas of penetration testing. We can do:
  • Web Application or API​ Penetration Testing
  • External/Internal Infrastructure Penetration Testing
  • Wireless Penetration Testing
  • SCADA Penetration Testing
  • Hardware Penetration Testing
  • Mobile IOS/Android Application Penetration Testing
  • Red Teaming Engagement
  • Social Engineering
  • Cloud Infrastructure Penetration Testing
After performing 1000's of penetration tests across government, banking, finance, private sector, home appliances, education, critical infrastructure and mission critical systems, our breadth of knowledge is wide ranging. 
​
Learn More

03 PROTECTIVE

Managed Security Services
Sometimes you just don't have the internal resources or expertise to fix security issues.  This is where we come in.  We can help monitor your external security as if we were one of your IT team.  We are experts so why not use us as a cheaper resource than a full time employee? For a monthly fee we can be your safety net.

We also understand that sometimes fixing vulnerabilities identified in penetration tests just isn't feasible. You may not have the expertise or a system may be being decommissioned in 12 months and you just need to protect it until then.  We can protect your site with one of our managed WAF solutions.  The end result will be transparent to you and your users but you will have peace of mind that your vulnerabilities are not exploitable.  Depending on your specific requirements we can do anything from protecting against vulnerabilities in your web application to DDoS protection. We don't use a one size fits all model and we may use a combination of technologies to protect you. The value to you is that it is all managed behind the scenes for you.
LEARN MORE

04 PREEMPTIVE

Secure Design and Architecture
Are you ready to launch your project and need to consider the security implications before going live?
Our consultants are experts in security design and architecture.  We can review and identify risks in your design and offer guidance.  This ensures that security is a forethought in your design and that you are aware of any and all potential security issues. We have consulted for a range of sectors from government, banking, finance, private sector, home appliances, education, critical infrastructure and mission critical systems, our breadth of knowledge is wide ranging.

Heard of 'Blue Teaming'? It is the defensive side of passing a penetration test or fending off attackers.  Our Blue Teaming workshops are hands on and teach your sys admins and network admins all the tricks used by a hacker.  We will work through closing off all the lateral movement vectors that attackers use on a network. The best way to learn defence is by understanding attacker's techniques and tools.
LEARN MORE

Why work with Red Cursor?

Our customers come first 
We believe in ease of sale.  We want to make it easy for you to engage and buy from us.  This means we will do everything we can to accommodate your schedule.  We will also help and guide you with your scope to ensure that:
  1. You are not testing things you don't need to
  2. You haven't missed something you should include
We are committed to providing a premium service that does not disappoint.
We promise you the best
Anytime you engage Red Cursor you are given a senior principal consultant.  You are also assigned a dedicated project manager who will see your project through from start to finish.  All consultants are CREST certified and are absolute experts in the security field.

Services

Incident Response and Forensics
Penetration Testing and Ethical Hacking
Specialist Security Consulting
Managed Security Services

COMPANY

About Red Cursor
Contact Us

© COPYRIGHT 2018. ALL RIGHTS RESERVED.
  • Home
  • Services
  • About
  • Contact
  • Blog