{"id":762,"date":"2023-03-22T16:56:37","date_gmt":"2023-03-22T19:56:37","guid":{"rendered":"https:\/\/www.insside.net\/?page_id=762"},"modified":"2023-04-17T11:54:09","modified_gmt":"2023-04-17T14:54:09","slug":"red-team","status":"publish","type":"page","link":"https:\/\/www.insside.net\/en\/services\/red-team\/","title":{"rendered":"Red Team"},"content":{"rendered":"\n\t<section class=\"section servicios_intro\" id=\"section_788976816\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row\"  id=\"row-502248895\">\n\n\n\t<div id=\"col-1510706923\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_496395524\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" style=\"margin:-100px 0px 0px 0px;\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"259\" height=\"240\" src=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/02\/servicios_icon-offensive.svg\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 259w\" sizes=\"(max-width: 259px) 100vw, 259px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_496395524 {\n  width: 80%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-271455400\" class=\"col medium-8 small-12 large-8\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2031059167\" class=\"text\">\n\t\t\n\n<h1>Red <span class=\"alt-font bold\" data-text-color=\"primary\">Team<\/span><\/h1>\n\t\t\n<style>\n#text-2031059167 {\n  font-size: 2rem;\n}\n<\/style>\n\t<\/div>\n\t\n<h3>We run Cybersecurity Offensive services aimed at detecting<br \/>\nvulnerabilities and exploiting them by simulating an external attack. <\/h3>\n\t<div id=\"text-1987094517\" class=\"text\">\n\t\t\n\n<p>The scopes considered allow to evaluate architectures, infrastructure, applications and processes.\n<\/p>\n\t\t\n<style>\n#text-1987094517 {\n  font-size: 1.1rem;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_788976816 {\n  padding-top: 90px;\n  padding-bottom: 90px;\n}\n#section_788976816 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_788976816 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section servicios_desc\" id=\"section_988104326\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row row-large\"  id=\"row-1033867616\">\n\n\n\t<div id=\"col-494647072\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3508185989\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-601\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/pentesting.svg\" alt=\"\" width=\"85\" height=\"50\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/pentesting.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/pentesting.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/pentesting.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/pentesting.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/pentesting.svg 85w\" sizes=\"(max-width: 85px) 100vw, 85px\" \/> Pentesting<\/h3>\n\t\t\n<style>\n#text-3508185989 {\n  color: #92e0ff;\n}\n#text-3508185989 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We work on infrastructure, systems and web applications with the aim of finding vulnerabilities that could be exploited by an attacker. We also evaluate the exposed surface and analyze the assets that could be attacked. We evaluate and guide the mitigation and remediation actions of the detected vulnerabilities.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1482386501\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-14856429\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-600\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/ethical-hacking.svg\" alt=\"\" width=\"73\" height=\"76\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ethical-hacking.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ethical-hacking.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ethical-hacking.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ethical-hacking.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ethical-hacking.svg 73w\" sizes=\"(max-width: 73px) 100vw, 73px\" \/> Ethical Hacking<\/h3>\n\t\t\n<style>\n#text-14856429 {\n  color: #92e0ff;\n}\n#text-14856429 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We run Offensive Cybersecurity services aimed at detecting vulnerabilities and exploiting them by simulating an external attack. The scopes considered allow to evaluate architectures, infrastructure, applications and processes.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-980895609\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2744148709\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-599\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/ejercicios-red-team.svg\" alt=\"\" width=\"83\" height=\"74\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ejercicios-red-team.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ejercicios-red-team.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ejercicios-red-team.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ejercicios-red-team.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/ejercicios-red-team.svg 83w\" sizes=\"(max-width: 83px) 100vw, 83px\" \/> Red Team Exercises<br>\n<\/h3>\n\t\t\n<style>\n#text-2744148709 {\n  color: #92e0ff;\n}\n#text-2744148709 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We run attack simulation exercises that allow evaluating cybersecurity architectures, incident detection mechanisms and platforms, incident response processes and capabilities of professional teams that have responsibility over previous processes. Depending on the objectives, we coordinate with the areas involved by the organization. We provide feedback about the results obtained and our proposals for improvement at the level of infrastructure and processes.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-404192780\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-856431083\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-595\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/analisis.svg\" alt=\"\" width=\"84\" height=\"69\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/analisis.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/analisis.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/analisis.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/analisis.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/analisis.svg 84w\" sizes=\"(max-width: 84px) 100vw, 84px\" \/> Vulnerability Scanning<br>\n<\/h3>\n\t\t\n<style>\n#text-856431083 {\n  color: #92e0ff;\n}\n#text-856431083 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We check infrastructure, base systems and applications for vulnerabilities that can be exploited by an attacker.<br \/>\nWe work based on manual actions and automated tools that allow us to collect information and compare it against vulnerability databases.<br \/>\nThe information can be integrated into a managed vulnerability service and\/or patched by our Blue Team.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1190867085\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3991221305\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-598\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/cajeros.svg\" alt=\"\" width=\"72\" height=\"52\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/cajeros.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/cajeros.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/cajeros.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/cajeros.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/cajeros.svg 72w\" sizes=\"(max-width: 72px) 100vw, 72px\" \/> Ethical Hacking ATM<\/h3>\n\t\t\n<style>\n#text-3991221305 {\n  color: #92e0ff;\n}\n#text-3991221305 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We work on the physical and logical components of ATMs with the aim of finding vulnerabilities that could be exploited by an attacker. We perform a physical exposure analysis that can lead to actions of theft, breakage and intervention: video cameras, peripherals, sensors, physical location, among others. We complement with analysis of the logical layer, operating systems, applications, management software, access control, auditing, among others.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1576910872\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1538123907\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-597\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/bio-facial.svg\" alt=\"\" width=\"61\" height=\"69\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/bio-facial.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/bio-facial.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/bio-facial.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/bio-facial.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/bio-facial.svg 61w\" sizes=\"(max-width: 61px) 100vw, 61px\" \/> Facial biometrics solutions tests<br>\n<\/h3>\n\t\t\n<style>\n#text-1538123907 {\n  color: #92e0ff;\n}\n#text-1538123907 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We analyze and evaluate the integration between facial biometrics applications and solutions in order to detect vulnerabilities that may lead to fraud. We review of digital onboarding applications and validate transactions that use facial biometrics as an identity verification solution.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-27392123\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2716005896\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-596\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/asv.svg\" alt=\"\" width=\"69\" height=\"70\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/asv.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/asv.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/asv.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/asv.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/asv.svg 69w\" sizes=\"(max-width: 69px) 100vw, 69px\" \/>ASV scans<br>\n<\/h3>\n\t\t\n<style>\n#text-2716005896 {\n  color: #92e0ff;\n}\n#text-2716005896 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>We perform required vulnerability scans within the PCI regulatory framework. Platform access for unlimited scans<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-108892947\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-108892947 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row\"  id=\"row-1921297289\">\n\n\n\t<div id=\"col-2018356707\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n<a href=\"\/en\/contact\/\" target=\"_self\" class=\"button secondary\"  style=\"border-radius:99px;\">\n    <span>Ask for more information<\/span>\n  <\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_988104326 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n#section_988104326 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_988104326 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section ver_servicios\" id=\"section_1257634943\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\r\n\r\n<div class=\"row\"  id=\"row-1939446844\">\r\n\r\n\n\t<div id=\"col-1971014631\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div id=\"text-3904239952\" class=\"text\">\n\t\t\r\n\r\n<h2>Other services<\/h2>\r\n\r\n\t\t\n<style>\n#text-3904239952 {\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\r\n<\/div>\r\n<div class=\"row align-center\" style=\"max-width:1320px\" id=\"row-23695800\">\r\n\r\n\n\t<div id=\"col-1775205849\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_386591508\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"253\" height=\"242\" src=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/02\/servicios_icon-defensive.svg\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-defensive.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-defensive.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-defensive.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-defensive.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-defensive.svg 253w\" sizes=\"(max-width: 253px) 100vw, 253px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_386591508 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Blue<br \/><span data-text-color=\"primary\">Team<\/span><\/h3>\r\n<a href=\"\/en\/services\/blue-team\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>See +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\n\t<div id=\"col-996042610\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_657992405\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"259\" height=\"240\" src=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/02\/servicios_icon-offensive.svg\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-offensive.svg 259w\" sizes=\"(max-width: 259px) 100vw, 259px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_657992405 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Red <br \/><span data-text-color=\"primary\">Team<\/span><\/h3>\r\n<a href=\"\/en\/services\/red-team\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>See +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\n\t<div id=\"col-1883617951\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_612043158\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"240\" src=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/02\/servicios_icon-dev.svg\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-dev.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-dev.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-dev.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-dev.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/servicios_icon-dev.svg 258w\" sizes=\"(max-width: 258px) 100vw, 258px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_612043158 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Governance, Risk <span data-text-color=\"primary\">&amp; Compliance<\/span><\/h3>\r\n<a href=\"\/en\/services\/grc\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>See +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\n\t<div id=\"col-721017725\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_53812902\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"207\" height=\"186\" src=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/02\/Group-233.svg\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-233.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-233.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-233.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-233.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-233.svg 207w\" sizes=\"(max-width: 207px) 100vw, 207px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_53812902 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Dev <br \/><span data-text-color=\"primary\">Security<\/span><\/h3>\r\n<a href=\"\/en\/services\/dev-security\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>See +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\n\t<div id=\"col-1306636839\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_204785796\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"187\" src=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/02\/Group-234.svg\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-234.svg 150w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-234.svg 300w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-234.svg 768w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-234.svg 1024w, https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/Group-234.svg 196w\" sizes=\"(max-width: 196px) 100vw, 196px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_204785796 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Identity <span data-text-color=\"primary\">Management<\/span><\/h3>\r\n<a href=\"\/en\/services\/identity-management\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>See +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\r\n<\/div>\r\n\r\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1257634943 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n#section_1257634943 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_1257634943 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":0,"parent":209,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-transparent-header.php","meta":{"content-type":"","footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Offensive Cybersecurity Area - INSSIDE<\/title>\n<meta name=\"description\" content=\"We detect cybersecurity vulnerabilities and use them to simulate external attacks by evaluating architectures, applications and processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.insside.net\/en\/services\/red-team\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Offensive Cybersecurity Area - INSSIDE\" \/>\n<meta property=\"og:description\" content=\"We detect cybersecurity vulnerabilities and use them to simulate external attacks by evaluating architectures, applications and processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.insside.net\/en\/services\/red-team\/\" \/>\n<meta property=\"og:site_name\" content=\"Insside EN\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-17T14:54:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/pentesting.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.insside.net\/en\/services\/red-team\/\",\"url\":\"https:\/\/www.insside.net\/en\/services\/red-team\/\",\"name\":\"Offensive Cybersecurity Area - INSSIDE\",\"isPartOf\":{\"@id\":\"https:\/\/www.insside.net\/en\/#website\"},\"datePublished\":\"2023-03-22T19:56:37+00:00\",\"dateModified\":\"2023-04-17T14:54:09+00:00\",\"description\":\"We detect cybersecurity vulnerabilities and use them to simulate external attacks by evaluating architectures, applications and processes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.insside.net\/en\/services\/red-team\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.insside.net\/en\/services\/red-team\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.insside.net\/en\/services\/red-team\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/www.insside.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/www.insside.net\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Red Team\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.insside.net\/en\/#website\",\"url\":\"https:\/\/www.insside.net\/en\/\",\"name\":\"Insside EN\",\"description\":\"L\u00edderes en Ciberseguridad\",\"publisher\":{\"@id\":\"https:\/\/www.insside.net\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.insside.net\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.insside.net\/en\/#organization\",\"name\":\"Insside EN\",\"url\":\"https:\/\/www.insside.net\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insside.net\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/03\/insside_logo-fav-1.png\",\"contentUrl\":\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/03\/insside_logo-fav-1.png\",\"width\":77,\"height\":77,\"caption\":\"Insside EN\"},\"image\":{\"@id\":\"https:\/\/www.insside.net\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Offensive Cybersecurity Area - INSSIDE","description":"We detect cybersecurity vulnerabilities and use them to simulate external attacks by evaluating architectures, applications and processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.insside.net\/en\/services\/red-team\/","og_locale":"en_US","og_type":"article","og_title":"Offensive Cybersecurity Area - INSSIDE","og_description":"We detect cybersecurity vulnerabilities and use them to simulate external attacks by evaluating architectures, applications and processes.","og_url":"https:\/\/www.insside.net\/en\/services\/red-team\/","og_site_name":"Insside EN","article_modified_time":"2023-04-17T14:54:09+00:00","og_image":[{"url":"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/pentesting.svg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.insside.net\/en\/services\/red-team\/","url":"https:\/\/www.insside.net\/en\/services\/red-team\/","name":"Offensive Cybersecurity Area - INSSIDE","isPartOf":{"@id":"https:\/\/www.insside.net\/en\/#website"},"datePublished":"2023-03-22T19:56:37+00:00","dateModified":"2023-04-17T14:54:09+00:00","description":"We detect cybersecurity vulnerabilities and use them to simulate external attacks by evaluating architectures, applications and processes.","breadcrumb":{"@id":"https:\/\/www.insside.net\/en\/services\/red-team\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.insside.net\/en\/services\/red-team\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.insside.net\/en\/services\/red-team\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.insside.net\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.insside.net\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Red Team"}]},{"@type":"WebSite","@id":"https:\/\/www.insside.net\/en\/#website","url":"https:\/\/www.insside.net\/en\/","name":"Insside EN","description":"L\u00edderes en Ciberseguridad","publisher":{"@id":"https:\/\/www.insside.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.insside.net\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.insside.net\/en\/#organization","name":"Insside EN","url":"https:\/\/www.insside.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insside.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/03\/insside_logo-fav-1.png","contentUrl":"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/03\/insside_logo-fav-1.png","width":77,"height":77,"caption":"Insside EN"},"image":{"@id":"https:\/\/www.insside.net\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/pages\/762"}],"collection":[{"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/comments?post=762"}],"version-history":[{"count":10,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/pages\/762\/revisions"}],"predecessor-version":[{"id":892,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/pages\/762\/revisions\/892"}],"up":[{"embeddable":true,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/pages\/209"}],"wp:attachment":[{"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/media?parent=762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}