terminal

Pentest - a real analysis of the security of the organization (Red Team)

We carry out attacks and testing for penetration: we analyze vulnerabilities, we identify vectors, demonstrate scenarios, by which a real attacker can act

Testing methods

Black Box Patter

Patterna Testing Gray Box (Grey Box)

Patterna Patterna White Box (White Box)

Testing by social engineering methods

Stress testing for service refusal (DDOS)

Each step is planned

01 Planning

02 intelligence

03 Analysis of vulnerabilities

04 report

05 Action plan

01 Planning

We imitate the actions of real hackers - but in your interests.

02 intelligence

We work according to the scenarios of real attacks - in all available ways.  We use the tools of hackers - from public to internal developments.

03 Analysis of vulnerabilities

We act officially and transparently - within the framework of the requirements of regulators and business tasks. We fix all the revealed vulnerabilities and risks without hiding.

04 report

You get: a technical report for specialists, a management summary for management, a priority plan for eliminating unacceptable events. 

05 Action plan

The result is an accurate understanding of weaknesses and priority steps to strengthen safety

Madrigal in numbers and facts

Licenses

FSTEK and FSB of Russia

Social SOC

In the 25/8 mode

AI-laboratory

For the tasks of your business

Web server

Own development with built -in protection modules: Antiddos, WAF, NGFW
number-boxtable
glass
glass
\glass
glass
People
Years
customers from the TOP-100 RU companies
data centers is in the office
table

Its own II laboratory and data center

AI-laboratory

  • We build AI solutions for internal and client projects - models, consultants, assistants, decision support systems.
  • We launch projects, experiment, finalize. Everything is under control, on their infrastructure.
  • We highlight the power for research, experiments and our own development.

Data center

  • Safe connection schemes, isolated segments for backups.
  • Certified fault -tolerant hypervisor.
  • All infrastructure - under monitoring: from servers to climate sensors.
  • No compromises on accessibility and protection.