{"id":31742,"date":"2022-10-12T11:25:07","date_gmt":"2022-10-12T09:25:07","guid":{"rendered":"https:\/\/www.usd.de\/security-analysis-pentests\/red-team-assessment\/"},"modified":"2026-03-23T16:39:24","modified_gmt":"2026-03-23T15:39:24","slug":"red-teaming","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/red-teaming\/","title":{"rendered":"Red Teaming"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text admin_label=\"Text\" _builder_version=\"4.18.1\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-header-red-teaming.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"105px||62px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Red Team Assessment<\/h1>\n<p style=\"text-align: center\">We find the vulnerabilities<br \/>that help hackers achieve their goal.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"13px|0px|13px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>How vulnerable is your company? Could your security organization detect a hacker attack at an early stage and successfully defend against it? With our Red Team Assessment, we provide you with information about the damage your company would face in the event of a successful cyber attack.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"65px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.18.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||18px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>What Makes usd the First Choice For Red Teaming?<\/h2>\n<p>[\/et_pb_text][et_pb_slider show_content_on_mobile=\"off\" disabled_on=\"off|off|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" body_text_align=\"center\" background_color=\"RGBA(0,0,0,0)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Slider-Red-Teaming-Gruende_BG.jpg\" background_size=\"contain\" custom_padding=\"60px||60px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Customized Threat Scenarios<\/h3>\n<h3 style=\"color: white;font-size: 145%;font-weight: 300;line-height: 140%;text-align: left\">Because we understand that every<br \/>\ncompany is unique and therefore exposed<br \/>\nto a wide variety of threats.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">At Your Side from Start to Finish<\/h3>\n<h3 style=\"color: white;font-size: 145%;font-weight: 300;line-height: 140%;text-align: left\">From selecting attack scenarios and<br \/>\ninternal coordination to the effective<br \/>\nimplementation of protective measures.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Extensive Experience<\/h3>\n<h3 style=\"color: white;font-size: 145%;font-weight: 300;line-height: 140%;text-align: left\">20 years of experience in security analysis<br \/>\ncombined with modern red teaming.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Specialized Expertise<\/h3>\n<h3 style=\"color: white;font-size: 145%;font-weight: 300;line-height: 140%;text-align: left\">Red teaming as part of usd HeroLabs.<br \/>\nBenefit from certified red team experts and<br \/>\nover 60 pentesters for all types of assets.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 155%;font-weight: 400;line-height: 140%;text-align: left\">Red Teaming Made in Germany<\/h3>\n<h3 style=\"color: white;font-size: 145%;font-weight: 300;line-height: 140%;text-align: left\">We know your regulatory requirements<br \/>\n\u2013 from information security and data<br \/>\nprotection to critical infrastructures.<\/h3>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|on\" _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"-102px|auto|5%|auto|false|false\" custom_padding=\"0px||21px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.18.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"5%||||false|false\" custom_padding=\"||18px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>What Makes usd the First Choice For Red Teaming?<\/h2>\n<p>[\/et_pb_text][et_pb_slider _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"||-25px||false|false\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Customized Threat Scenarios<\/h3>\n<p>Because we understand that every\u00a0company is unique and therefore exposed\u00a0to a wide variety of threats.<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>At Your Side from Start to Finish<\/h3>\n<p>From selecting attack scenarios and internal coordination to the effective implementation of protective measures.<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Extensive Experience<\/h3>\n<p>20 years of experience in security analysis combined with modern red teaming.<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Specialized Expertise<\/h3>\n<p>Red teaming as part of usd HeroLabs. Benefit from certified red team experts and over 60 pentesters for all types of assets.<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Red Teaming Made in Germany<\/h3>\n<p>We know your regulatory requirements \u2013 from information security and data protection to critical infrastructures.<\/p>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"19px|auto||auto||\" custom_padding=\"35px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>How usd AG Supports You in Red Teaming in Concrete Terms<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming-assessment.svg\" title_text=\"usd-ag-red-teaming-assessment\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"65%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Red Team Assessment<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>In a red team assessment, the usd red team assumes the role of a malicious group of attackers targeting your company. The team works with you to define a customized threat scenario and attacks your company using the methods of real attackers to test the resilience of your security organization under real-world conditions.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"2%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming-purple-teaming.svg\" title_text=\"usd-ag-red-teaming-purple-teaming\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"65%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Purple Teaming<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>As part of purple teaming, our red team works together with your blue team to simulate attacks, exchange information, and develop countermeasures in order to identify security gaps and, above all, improve your detection and response capabilities.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"2%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming-threat-led-penetration-testing.svg\" title_text=\"usd-ag-red-teaming-threat-led-penetration-testing\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"65%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Threat-Led Penetration Testing (TLPT)<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>DORA requires TLPT as a complementary tool to classic, asset-based penetration tests. Based on the TIBER-EU framework, \u00a0TLPT aims to test the resilience and security of critical and important functions.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"2%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming-szenario-pentests.svg\" title_text=\"usd-ag-red-teaming-szenario-pentests\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"65%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Scenario Pentests<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>A scenario penetration test is a targeted test in which the red team uses a \u201cwhat if\u201d question to simulate a realistic attack path (e.g., \u201cWhat happens if an employee downloads malware or a supplier is compromised?\u201d) in order to understand the impact of this specific scenario on your systems and derive appropriate security measures.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"2%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming-social-engineering-physical-pentests.svg\" title_text=\"usd-ag-red-teaming-social-engineering-physical-pentests\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"65%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Social Engineering and Physical Pentests<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>As part of these tests, we address vulnerabilities beyond your IT infrastructure. For us, security in depth means considering IT, people, processes, and operating sites as part of the attack surface and checking them with the necessary means.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"2%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming-adversary-simulation-emulation.svg\" title_text=\"usd-ag-red-teaming-adversary-simulation-emulation\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"65%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Adversary Simulation &amp; Emulation<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>As part of adversary emulation, the security experts at usd Red Team replicate the tactics, techniques, and procedures (TTPs) of specific, real-world threat actors in detail so that you can determine how well your protective mechanisms and Security Operations Center (SOC) are prepared for an attack by a particular group of attackers.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|on|on\" _builder_version=\"4.27.3\" _module_preset=\"default\" overflow-x=\"hidden\" overflow-y=\"hidden\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.3\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text content_tablet=\"<\/p>\n<ul>\n<li>Evaluate the real impact on your infrastructure in the event of a cyber attack.<\/li>\n<li>Red Team Assessments on a regular basis will become mandatory for many companies in the financial sector from 2025 in the context of the DORA regulation.<\/li>\n<li>Test and train your security organization's ability to detect real cyber attacks at an early stage and initiate appropriate countermeasures.<\/li>\n<li>Check the effectiveness of your technical security measures to protect against cyber attacks.<\/li>\n<\/ul>\n<p>\" content_phone=\"<\/p>\n<ul>\n<li>Evaluate the real impact on your infrastructure in the event of a cyber attack.<\/li>\n<li>Red Team Assessments on a regular basis will become mandatory for many companies in the financial sector from 2025 in the context of the DORA regulation.<\/li>\n<li>Test and train your security organization's ability to detect real cyber attacks at an early stage and initiate appropriate countermeasures.<\/li>\n<li>Check the effectiveness of your technical security measures to protect against cyber attacks.<\/li>\n<\/ul>\n<p>\" content_last_edited=\"on|desktop\" disabled_on=\"off|on|on\" _builder_version=\"4.27.3\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Evaluate the real impact on your infrastructure in the event of a cyber attack.<\/li>\n<li>Red Team Assessments on a regular basis will become mandatory for many companies in the financial sector from 2025 in the context of the DORA regulation.<\/li>\n<li>Test and train your security organization's ability to detect real cyber attacks at an early stage and initiate appropriate countermeasures.<\/li>\n<li>Check the effectiveness of your technical security measures to protect against cyber attacks.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"35px||8%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-kachel-red-teaming.jpg\" title_text=\"usd-herolab-pentest-kachel-red-teaming\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Our Red Teaming Methodology<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Learn about our red teaming methodology in detail and how we deliver actionable insights to improve your security measures..<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming\/red-teaming-methodology\/\" button_text=\"Our Red Teaming methodology in detail\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" custom_margin=\"4%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.3\" _module_preset=\"default\" custom_padding=\"24px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.18.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.3\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>usd News: Get More Insights<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.21)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/threat-led-penetration-testing-tlpt-usdAG.jpg\" background_blend=\"darken\" link_option_url=\"https:\/\/www.usd.de\/en\/dora-deep-dive-threat-led-penetration-testing-tlpt\/\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"0px|34px||34px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">DORA Deep-Dive: Threat-Led Penetration Testing<br \/>(TLPT)<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/dora-deep-dive-threat-led-penetration-testing-tlpt\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" button_text_color=\"#f6f6f6\" button_bg_color=\"#F07F1D\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 100%\" button_border_width=\"0px\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.7)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming.jpg\" background_blend=\"darken\" link_option_url=\"https:\/\/www.usd.de\/en\/red-teaming-final-boss-of-security-architecture\/\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"0px|34px||34px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Red Teaming: Challenge Your Security Architecture With the Final Boss<\/span><\/h3>\n<p>&nbsp;[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming-final-boss-of-security-architecture\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" button_text_color=\"#f6f6f6\" button_bg_color=\"#F07F1D\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 100%\" button_border_width=\"0px\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"16px|||||\" hover_enabled=\"0\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.7)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-news-blogpost-red-teaming-.jpg\" background_blend=\"multiply\" link_option_url=\"https:\/\/www.usd.de\/en\/red-teaming-5-questions-it-leaders-want-answered\/\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"15px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Red Teaming: 5 Questions Every<br \/>IT Leader Wants Answered<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming-5-questions-it-leaders-want-answered\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 99%\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.7)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-usd-ag-physical-pentest-red-teaming.jpg\" background_blend=\"multiply\" link_option_url=\"https:\/\/www.usd.de\/en\/red-teaming-deep-dive-physical-pentest\/\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" alt=\"Access control in an office building using security badges, door readers, and visual laser sensors as a representation of physical penetration testing and red teaming.\" title_text=\"news-usd-ag-physical-pentest-red-teaming\" sticky_enabled=\"0\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"15px||0px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Physical Pentesting: How Resilient Is Your Organization?<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming-deep-dive-physical-pentest\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.6\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 99%\" custom_margin=\"||30px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Red Team Assessment We find the vulnerabilitiesthat help hackers achieve their goal.How vulnerable is your company? Could your security organization detect a hacker attack at an early stage and successfully defend against it? With our Red Team Assessment, we provide you with information about the damage your company would face in the event of a [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-31742","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/31742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=31742"}],"version-history":[{"count":11,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/31742\/revisions"}],"predecessor-version":[{"id":64854,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/31742\/revisions\/64854"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=31742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}