For companies and government institutions that have a vital interest in security, Triangular Group Academy offers a unique and ultimate securitycheck in cooperation with EYE Cyber Security. Former employees of the intelligence services and Special Forces test the security at your organisation.
The goal is to test whether we can access your high-value assets. Both the physical and the cyber domain will be explored to exploit weaknesses.
Our multidsiciplinary team consists of specialists in the field of offensive tehcnology, social engineers, observation experts and penetration specialistis. Just like your real-life opponent, we take the time to test your organisation step by step and exploit opportunities. You will get an insight into possible weaknesses within your organisation and in which parts of your organisation the (cyber)security is solid. That is the difference with reality, we involve you every step of the way.
After this test you will have an excellent picture of your organization in terms of safety and you can make any necessary improvements in a very targeted manner. Our experts are happy to help you with this.
After this test you will have an excellent picture of your organization in terms of safety and you can make any necessary improvements in a very targeted manner. Our experts are happy to help you with this.
There are many parties that offer Red Teaming, usually with the similar components and approach. We make the difference because of our background at the Dutch intelligence services and the level at which our specialists acted during their carreer in the intelligence community. Furthermore, the combination of HUMINT/OSINT experts and cyber security experts is very powerful.
Customers often have the tendency to judge their cyber vulnerability as monodisciplinary. For example: There is a risk of ransom software, how can I secure my systems using software so that the cyber attack will be detected and isolated? With a multidisciplinary approach, other factors such as behaviour, protocols, training and organisations are accounted for. Especially in those latter domains our services come in handy.
Triangular Group Academy understands the trade of undetected observation (offline and online) and to use that to identify systemic weaknesses. When we have identified a number of weakpoints and evaluated their importance, we will draw up a plan to influence the human factor, so that we can set up our targeted cyber attack strategy: the penetration.
The aim of this penetration is to be able to present conclusions and findings that are supported by concrete examples to the customer. Next, with some advice and adjustments we can take away the weakpoints. We do this in a number of areas to ensure that the resilience of vital systems is improved.
We are discreet and honest and destroy all tremors after handover to our customers.
Prolonged Red Teaming
Our approach
Leave your contact details here.
We will contact you as soon as possible.