Login to profile
IBM

X-Force Red is an autonomous team of veteran hackers hired to break into organizations and uncover risky vulnerabilities that threat actors may use for personal gain. X-Force Red offers ffensive security services which includes penetration testing, vulnerability management programs, red teaming, code review, static analysis and vulnerability assessments. Their goal is to help security leaders identify and remediate security flaws, covering their entire digital and physical ecosystem.

Contact: Brian McGlone
E: [email protected]

T: 07764-290413

Membership Start Date: 01 Oct 2014

No. of Employees: 10,000-39,999

CREST Accreditations

CREST Partner Programmes

Other Accreditations and Services

Penetration Testing

Contact
Brian McGlone
+44 (0)7764 290413
[email protected]
https://www.ibm.com/security/services/penetration-testing

Testing services for AI
Uncover and address security vulnerabilities across Foundation Models and Large Language Models (FM/LLMs), MLSecOps Pipelines, AI Platforms, and Generative AI (GenAI) applications.

Application testing
Test your mobile, web, IoT, and backend applications. X-Force Red can provide manual penetration testing, secure code review, binary analysis, and vulnerability assessments of any platform.

Network testing
Prevent opportunistic attacks with X-Force Red manual network penetration testing. Our hackers identify vulnerabilities that may lead to opportunistic attacks and testing uncovers vulnerabilities that scanners cannot, such as logic flaws, back doors, and misconfiguration.

Hardware testing
Test engineering and security from a hacker’s point of view. X-Force Red can reverse-engineer your devices to find vulnerabilities during development, assess source code and data in and out of systems, and identify vulnerabilities in product implementation and external libraries.

Social engineering
Humans can be the weakest link in your security. Determining the risks of human behavior is a key aspect of social engineering. X-Force Red engagements can include ruses attackers may use to trick your employees into divulging sensitive information.

Cloud testing
We provide cloud configuration and infrastructure review to find critical misconfigurations that can lead to privilege escalation or unauthorized access to sensitive data. X-Force Red hackers can uncover potential attack paths and insecure DevOps practices such as sharing secrets (privileged credentials, API/SSH keys, and more). They also find and fix exploitable flaws inside containers and the connected environment.

Adversary Simulation
Uncover and fix gaps in your incident response programs through red teaming, purple teaming, control testing and tuning, and threat intelligence testing exercises.

CREST Qualified Consultants:

  • CREST Practitioner Security Analyst
  • CREST Registered Penetration Tester
  • Contact: Brian McGlone