{"id":1194,"date":"2025-10-13T16:26:21","date_gmt":"2025-10-13T14:26:21","guid":{"rendered":"https:\/\/addyet.xyz\/it-security\/red-team-assessments"},"modified":"2025-12-22T12:13:21","modified_gmt":"2025-12-22T11:13:21","slug":"red-team-assessments","status":"publish","type":"page","link":"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments","title":{"rendered":"Red Team Assessments"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column]<style>.vcex-heading.vcex_69df61b6af9cb{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:1.2em;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h1 vcex_69df61b6af9cb\"><span class=\"vcex-heading-inner wpex-inline-block\">Red Teaming - Analysis from the perspective of the attacker<\/span><\/h1>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]The number of cyber-attacks on companies, authorities and organizations is increasing year on year. The attackers are becoming more professional. The success rate of these attacks is increasing. Proactive prevention is of crucial importance.<\/p>\n<p>One effective approach is red teaming. With this method, we evaluate your technical, organizational and physical security measures from the perspective of an attacker. The insights gained from a red teaming assessment enable a significant improvement in the overall security level of your company.[\/vc_column_text]<style>.vcex-button.vcex_69df61b6b1fc2{font-size:1.2rem;}<\/style><a href=\"#form\" class=\"vcex-button theme-button inline header-button vcex_69df61b6b1fc2\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\">Get free advice now<\/span><\/a> [\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column]<style>.vcex-heading.vcex_69df61b6b3728{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:var(--wpex-leading-loose);}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-center vc_custom_1765891032461 vcex_69df61b6b3728\"><span class=\"vcex-heading-inner wpex-inline-block\">Red Teaming: Why choose @-yet?<\/span><\/h2>[vc_row_inner gap=&#8221;35&#8243;][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69df61b6b4ffb .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69df61b6b4ffb .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69df61b6b4ffb .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69df61b6b4ffb .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69df61b6b4ffb\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">20 years of experience<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>Since @-yet GmbH was founded, we have been conducting complex Red Team Assessments, monitoring the market and covering industry-specific requirements.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69df61b6b739f .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69df61b6b739f .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69df61b6b739f .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69df61b6b739f .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69df61b6b739f\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Interdisciplinary approach<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>We adapt tactics, techniques and procedures to current real-world attack scenarios by incorporating the findings from countless IT forensic analyses into our red team assessments.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69df61b6b8c01 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69df61b6b8c01 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69df61b6b8c01 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69df61b6b8c01 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69df61b6b8c01\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Certified professionalism<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>Our Red Teams are made up of experts with internationally recognized certifications (including OSCP and OSEP), who constantly keep their skills up to date thanks to our internal training program.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765891125755{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_family=&#8221;Open Sans&#8221;]The risk is higher than ever before[\/vc_column_text]<style>.vcex-heading.vcex_69df61b6ba856{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6ba856\"><span class=\"vcex-heading-inner wpex-inline-block\">Red Teaming \u2013 Proactive prevention<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]There are many ways in which your company can become the victim of an attack. In addition to the theft of knowledge, it is primarily the extortion of money that makes attackers look for weak points. But have you thought about the fact that there are not only technical weak points in your organization?<\/p>\n<p>This is the approach taken by Red Teaming. It is much more than just a search for gaps in the IT infrastructure. It is a simulation of an attack on a broad front and using all means. A whole group of different @-yet specialists uses all conceivable means and methods to simulate an attack on your company. In doing so, our team identifies technical, physical and human weaknesses. On the basis of these findings, you can work with us to develop a comprehensive security concept for your company.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765891164116{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]The knowledge of an entire company[\/vc_column_text]<style>.vcex-heading.vcex_69df61b6bb37d{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6bb37d\"><span class=\"vcex-heading-inner wpex-inline-block\">An interdisciplinary approach<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]@-yet&#8217;s red teaming tests are designed not only to uncover vulnerabilities, but also to improve companies&#8217; ability to respond and withstand potential cyber-attacks. Our concept is based on an interdisciplinary approach. The insights gained from hundreds of analyses in areas such as digital forensics, penetration testing and threat analysis are incorporated into @-yet red teaming. This enables our experts to gain a deep understanding of the current methods and tools used by attackers. With this valuable knowledge, our teams develop realistic simulations on a par with the means and methods of hackers.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765891175929{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Certified quality[\/vc_column_text]<style>.vcex-heading.vcex_69df61b6bbec5{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6bbec5\"><span class=\"vcex-heading-inner wpex-inline-block\">Certified Red Teams<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Our Red Teams are made up exclusively of experts with the certifications \u201cOSCP\u201d, \u201cOSEP\u201d and \u201cRed Team Operator\u201d. This means that they have proven, in-depth specialist knowledge and advanced skills in the field of red team assessments. This guarantees you a high-quality security assessment and targeted vulnerability analysis. @-yet also places a high priority on the continuous training of its employees. The knowledge and experience of all other specialist teams is incorporated into this training. This means that our employees cover a wide range of different industries and technologies. This enables us to effectively analyze even complex and highly specialized security environments.[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:4rem;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1765891223817{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #00056E !important;}&#8221; el_class=&#8221;info-text-section&#8221;][vc_column]<style>.vcex-heading.vcex_69df61b6bccc1{color:#ffffff;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69df61b6bccc1\"><span class=\"vcex-heading-inner wpex-inline-block\">Do you know all the weak points in your company?<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#ffffff&#8221; font_size=&#8221;1.2rem&#8221;]The @-yet Red Team Assessments have been an integral part of @-yet&#8217;s service portfolio since the company was founded in 2002. They are carried out by experienced, certified experts who have gained their knowledge and experience from thousands of IT forensic analyses. By constantly adapting our approach to take into account techniques and methods from real attack scenarios, our teams are able to carry out even complex Red Team Assessments.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765891265672{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;24px&#8221;]The simulated large-scale attack on your company[\/vc_column_text]<style>.vcex-heading.vcex_69df61b6bd817{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6bd817\"><span class=\"vcex-heading-inner wpex-inline-block\">@-yet Red Team Assessments<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]By using complex and advanced attack techniques over a longer period of time, realistic attack scenarios are carried out against a company. These correspond to the actions of real threat actors. Often, only a few responsible individuals are involved in order to test the detection and response capabilities of an organization. This approach is suitable for environments that already have an increased level of technical and organizational security.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765891301065{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column]<style>.vcex-heading.vcex_69df61b6be38c{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6be38c\"><span class=\"vcex-heading-inner wpex-inline-block\">Methodology: How @-yet works<\/span><\/h2><style>.vcex-bullets.vcex_69df61b6bed09 .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69df61b6bed09{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69df61b6bed09\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Realistic and complex attack simulation over a longer period of time<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Individual adaptation of the methodology according to goal, organization and infrastructure<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Testing the effectiveness of existing security, detection and protection measures<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765891352154{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column]<style>.vcex-heading.vcex_69df61b6bf7ba{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6bf7ba\"><span class=\"vcex-heading-inner wpex-inline-block\">Your advantages<\/span><\/h2><style>.vcex-bullets.vcex_69df61b6bff4a .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69df61b6bff4a{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69df61b6bff4a\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">In-depth insights into the security weaknesses of the entire company<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Possibility of targeted safety improvements and protective measures<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Better preparation for real attack attempts through realistic exercises<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Improvement of the response capability<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765891810359{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Hand in hand with your security team[\/vc_column_text]<style>.vcex-heading.vcex_69df61b6c0973{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6c0973\"><span class=\"vcex-heading-inner wpex-inline-block\">@-yet Purple Team Assessments<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]When a company&#8217;s IT security team (Blue Team) works together with a team of experts from @-yet (Red Team), this is known as &#8220;Purple Teaming&#8221;. In this form of analysis, the two teams work closely together. By detecting and closing security gaps, further underlying vulnerabilities can be continuously discovered and promptly addressed. In addition, the procedure can be trained to prepare for the event that a real attacker is discovered in the network.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765892091353{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column]<style>.vcex-heading.vcex_69df61b6c14ba{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6c14ba\"><span class=\"vcex-heading-inner wpex-inline-block\">Methodology: How @-yet works<\/span><\/h2><style>.vcex-bullets.vcex_69df61b6c1c54 .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69df61b6c1c54{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69df61b6c1c54\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Cooperation between the company&#8217;s IT security team and the @-yet team<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Simulation of attacks using the methods, techniques and tools of real attackers<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Iterative improvement of security strategies<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Analysis and improvement of attack detection mechanisms<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Summary of all information in the form of a findings report<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765892397401{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column]<style>.vcex-heading.vcex_69df61b6c266e{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69df61b6c266e\"><span class=\"vcex-heading-inner wpex-inline-block\">Your advantages<\/span><\/h2><style>.vcex-bullets.vcex_69df61b6c2db4 .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69df61b6c2db4{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69df61b6c2db4\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Comprehensive assessment of the company&#8217;s security situation<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Support in the development of long-term security strategies<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Reliable identification of vulnerabilities in attack detection<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Your IT security team is intensively prepared for dealing with real threats<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; css=&#8221;.vc_custom_1759848861664{margin-bottom: 4rem !important;}&#8221;][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-bottom-width:1px;border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row local_scroll_id=&#8221;form&#8221;][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<header class=\"ce_contact__header\">\n<p class=\"overline\">With @-yet, you can protect what is most valuable.<\/p>\n<\/header>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><style>.vcex-heading.vcex_69df61b6c7f53{color:#00056e;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl vcex_69df61b6c7f53\"><span class=\"vcex-heading-inner wpex-inline-block\">Arrange your free, no-obligation consultation now.<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Arrange your personal appointment now for a non-binding and free consultation. Our security and data protection experts will be happy to answer your questions.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Direct contact:<\/strong><\/p>\n<p>Phone: +49 2175 16 55 0<br \/>\nEmail: info@at-yet.de<\/p>\n<p>Or via this form.<\/p>\n<p>We look forward to hearing from you!<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_2' ><form method='post' enctype='multipart\/form-data'  id='gform_2'  action='\/en\/wp-json\/wp\/v2\/pages\/1194' data-formid='2' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_2' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_2_5\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_5'>Salutation<\/label><div class='ginput_container ginput_container_select'><select name='input_5' id='input_2_5' class='large gfield_select'     aria-invalid=\"false\" ><option value='' >Please select<\/option><option value='Herr' >Mr.<\/option><option value='Frau' >Mrs.<\/option><\/select><\/div><\/div><fieldset id=\"field_2_1\" class=\"gfield gfield--type-name gfield--input-type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_2_1'>\n                            \n                            <span id='input_2_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.3' id='input_2_1_3' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_3' class='gform-field-label gform-field-label--type-sub '>First name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_2_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.6' id='input_2_1_6' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_6' class='gform-field-label gform-field-label--type-sub '>Last name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/fieldset><div id=\"field_2_6\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_6'>Company<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_2_6' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_7\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_7'>Position<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_2_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_3\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_3'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_3' id='input_2_3' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_2_4\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_4'>Phone<\/label><div class='ginput_container ginput_container_phone'><input name='input_4' id='input_2_4' type='tel' value='' class='large'    aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_8\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_8'>Your message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_8' id='input_2_8' class='textarea medium'      aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_2_10\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Further information<\/legend><div class='ginput_container ginput_container_consent'><input name='input_10.1' id='input_2_10_1' type='checkbox' value='1'    aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_10_1' >Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.<\/label><input type='hidden' name='input_10.2' value='Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.' class='gform_hidden' \/><input type='hidden' name='input_10.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><fieldset id=\"field_2_9\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Privacy protection<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_9.1' id='input_2_9_1' type='checkbox' value='1'   aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_9_1' >Yes, I have read and understood the contents of the <a href=\"\/en\/privacy-policy\">privacy policy<\/a>.<\/label><input type='hidden' name='input_9.2' value='Yes, I have read and understood the contents of the &lt;a href=&quot;\/en\/privacy-policy&quot;&gt;privacy policy&lt;\/a&gt;.' class='gform_hidden' \/><input type='hidden' name='input_9.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><div id=\"field_2_11\" class=\"gfield gfield--type-frcaptcha gfield--input-type-frcaptcha gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_11'>Ohne Titel<\/label><div class='ginput_container ginput_container_frcaptcha'><div class=\"frc-captcha \" data-sitekey=\"FCMKBD0ANB8C39IQ\" data-lang=\"en\" ><\/div>\n\t\t<noscript>You need to enable Javascript for the anti-spam check.<\/noscript><\/div><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_2' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit now'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_2' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_2' id='gform_theme_2' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_2' id='gform_style_settings_2' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_2' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='2' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='EUR' value='PmhgB3bfqK\/OnONCLP8O+lrp358Uka9KOlUekxPzF0zQRK3C1tAjBAu2WRt+0PgY8vVoIKW1hEXMhbCZABCiv+0lsavy\/Ol5qwGsnLWjfpBVQ9w=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_2' value='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' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_2' id='gform_target_page_number_2' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_2' id='gform_source_page_number_2' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_2').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_2');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_2').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_2').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_2').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_2').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_2').val();gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [2, current_page]);window['gf_submitting_2'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_2').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [2]);window['gf_submitting_2'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_2').text());}else{jQuery('#gform_2').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"2\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_2\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_2\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_2\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 2, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Red Teaming - Analysis from the perspective of the attacker The number of cyber-attacks on companies, authorities and organizations is increasing year on year. The attackers are becoming more professional. The success rate of these attacks is increasing. Proactive prevention is of crucial importance. One effective approach is red teaming. With this method, we evaluate&hellip;","protected":false},"author":2,"featured_media":0,"parent":887,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1194","page","type-page","status-publish","hentry","entry","no-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Red Team Assessments - @-yet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red Team Assessments\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments\" \/>\n<meta property=\"og:site_name\" content=\"@-yet\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T11:13:21+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/red-team-assessments\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/red-team-assessments\",\"name\":\"Red Team Assessments - @-yet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\"},\"datePublished\":\"2025-10-13T14:26:21+00:00\",\"dateModified\":\"2025-12-22T11:13:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/red-team-assessments#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/red-team-assessments\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/red-team-assessments#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Red Team Assessments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"name\":\"@-yet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.at-yet.de\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\",\"name\":\"@-yet\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"caption\":\"@-yet\"},\"image\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/at-yet\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Red Team Assessments - @-yet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments","og_locale":"en_US","og_type":"article","og_title":"Red Team Assessments","og_url":"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments","og_site_name":"@-yet","article_modified_time":"2025-12-22T11:13:21+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments","url":"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments","name":"Red Team Assessments - @-yet","isPartOf":{"@id":"https:\/\/www.at-yet.de\/en#website"},"datePublished":"2025-10-13T14:26:21+00:00","dateModified":"2025-12-22T11:13:21+00:00","breadcrumb":{"@id":"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.at-yet.de\/en\/it-security\/red-team-assessments#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.at-yet.de\/en"},{"@type":"ListItem","position":2,"name":"IT security","item":"https:\/\/www.at-yet.de\/en\/it-security"},{"@type":"ListItem","position":3,"name":"Red Team Assessments"}]},{"@type":"WebSite","@id":"https:\/\/www.at-yet.de\/en#website","url":"https:\/\/www.at-yet.de\/en","name":"@-yet","description":"","publisher":{"@id":"https:\/\/www.at-yet.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.at-yet.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.at-yet.de\/en#organization","name":"@-yet","url":"https:\/\/www.at-yet.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/","url":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","contentUrl":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","caption":"@-yet"},"image":{"@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/at-yet\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/comments?post=1194"}],"version-history":[{"count":6,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1194\/revisions"}],"predecessor-version":[{"id":1802,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1194\/revisions\/1802"}],"up":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/887"}],"wp:attachment":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/media?parent=1194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}