Security AssessmentsPurple Team Assessment Service

Collaborative network attack penetration testing

Red + Blue = Purple

You’ve got all the best security tools and procedures in place, but how can you be sure they all fit together to truly protect your organization?

Sword & Shield Enterprise Security offers our cooperative engagement Purple Team Assessment Service, a highly collaborative process that renders invaluable insight through real world attack and defense scenarios. Our Purple Team services allow you to hire a team of hackers to identify vulnerabilities in your security posture, allowing you to “plug the holes” before you’re compromised.

What is Purple Team?

A cybersecurity Purple Team exercise is a threat hunting exercise between Sword & Shield’s attacking force (Red Team) and your defending force (Blue Team) that goes above and beyond a vulnerability assessment or network scanning tools.

Note: Sword & Shield also offers these services. Visit our Security Assessments page to learn about these related services.

The primary goal of a Purple Team exercise is to evaluate your security controls and ability to detect attacks, compromise, lateral movement, command and control communications, and data exfiltration. This serves to enrich and validate detection mechanisms you have in place and to identify and reduce cyber attack paths. Simply put, Purple Teaming maximizes the results of Red Team activities and improves Blue Team capability.

Purple Teaming, or advanced penetration testing, is deep-level security intended for organizations with a mature information security program. The purpose is to show how vulnerabilities are used against a specific configuration or scenario, and if they are detectable.

Threat Hunting Using Adversary Simulation

Sword & Shield partners with you to construct a test that is unique to your business. Following this process provides insight into how hackers get around the controls currently in place:

Purple Team Assessment Service Process

Purple Team Attack Path Identification

The Purple Team Assessment Service evaluation identifies and exercises attack paths that could lead to compromise of a single system to an entire network and all of its hosts, as opposed to merely identifying a list of vulnerabilities found on hosts or a target network.

The results of this assessment should be integrated with your information security program to ensure its continuous improvement. Overall, this exercise will instill confidence in your current security controls and practices while identifying gaps in the organization’s implementation.

Sword & Shield’s Purple Team Assessment Service offers these potential attack paths or scenarios:

  • Successful Phishing Campaign
  • Unauthorized Device
  • Compromised Standard User Account
  • External Attacker

Purple Team evaluates the effectiveness and proper implementation of the following technologies (if implemented):

  • Firewall
  • Application White Listing
  • Segmentation
  • Anti Virus
  • Proxies
  • Log Management
  • Endpoint Detection

Get started with our Purple Team Assessment Service today! Download the data sheet, and request a no-obligation consultation.

Discover Your Hidden Risks and Vulnerabilities

Request a Free Consultation for our Purple Team Security Assessment Service.

Featured Additional Security Assessment Services

Sword & Shield provides a wide variety of security assessment related services for our clients. The following list provides an overview of some of the most common services we perform. For more details about these services or other services we perform, contact us today.

Database Security

Our engineers are experienced in auditing Oracle, Microsoft SQL, Notes, and several other database management system products. Among other things, Sword & Shield security engineers analyze authentication and authorization controls in the database system for least-privilege access controls and audit traceability. Emphasis is placed on matching the degree of security with the business and operational needs.

Firewall Audit

A Sword & Shield Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. As a first line of defense against attacks, firewalls and routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security.

Mobile Application Assessment

Our Mobile Application Assessment, when combined with our Web Application Assessment, provides a comprehensive assessment of the security of the web application and the mobile devices used to interact with the application. The service analyzes the network transmissions and forensically analyzes the mobile device(s) used.

Phone Sweep

Sword & Shield performs a sweep of the telephone address space to detect unauthorized modems and authorized but insecure modems. We can perform a phone sweep as a stand-alone service, or as part of another service, such as an external network vulnerability/penetration test.

Security Architecture Review

The Architecture Review and Design process is coordinated through a client project manager and includes a set of structured interviews. These interviews and reviews focus on business areas supported by the network and the technology staff that supports the business units.

Virtual Infrastructure Assessment

This service provides the customer with the analysis necessary to protect all facets of a virtualized infrastructure. Included are areas related to access control, the application of least privilege, data protection, secure network configuration, disaster recovery planning and testing, and threat analysis. The goal of the assessment is to identify security gaps and develop remediation strategies.

VPN Audit

The VPN Audit service audits your VPN and your VPN policies and recommends techniques to optimize and enhance your VPN’s effectiveness. We identify potential security vulnerabilities and help you reduce your risks.

Website Security Consulting

Web application security encompasses measures taken throughout the application’s life cycle to prevent exceptions in the security policy of an application or the underlying system vulnerabilities through flaws in the design, development, deployment, upgrade, or maintenance of the application.

Wireless Security

Sword & Shield's Wireless Testing examines the subsystems, components and security mechanisms of a wireless network and identifies any weaknesses.