Skip to content

Salus Cyber

Third
line of defence

Red Team

Targeted attacks

From a hacker's mindset

Threat actors find the weakest spot to exploit - whether systems, people or locations.

Our team has extensive experience of the highest degree, earnt in the defence sector. So our specialists truly understand the extent of evolving tactics threat actors will use to achieve their objective.

We attack as they would, using their tools, tactics, and procedures. So no stone is left unturned - making the unknowns, known.

Red Teaming

Intelligence-led Testing

Using your own threat intelligence or by consulting with our networks, our testing TTP’s give you an accurate representation of your resilience to attacks.

Threat Actors

While not selling Nation State level emulation, sophisticated threat actors can be emulated to provide a real-world testing experience.

Cyber Kill Chain

Working with you to anticipate and recognize insider threats, social engineering opportunities, advanced ransomware and innovative attacks. All mapped to the Cyber Kill Chain to ensure you can identify which stages are not being captured, or prevented, by your blue teams.

Physical Campaigns

Often overlooked, we offer physical security tests to help identify how systems can be overturned by attackers, including building access controls. We have performed this all over the world, including in hostile environments.

More Third line of defence services

Ransomware Attacks

Learn more

Consultancy

Learn more

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.
    Simple.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back