Contact Us

[contact-form-7 id="ceb4db8" title="Contact form 1"]

Client Login

Select a platform below to log in

TraceCSO
TraceInsight

Purple Team Testing

A collaborative test to validate internal detection and prevention solutions

Purple team engagements combine the efforts of our security analysts acting as the Red Team and your IT security personnel defending on the Blue Team. Blue Teams are generally some combination of your IT department, Managed Service Provider, Security Operations Center, or other security personnel. The objective is to identify weaknesses in your IT environment, as well as any gaps in your visibility, logging, and monitoring solutions.

In the event of an attack, your Blue Team should be alerted to any malicious activity by intrusion detection and prevention systems, firewalls, endpoint protection, system logs, etc. Would you be able to see malicious attacks happening in real time?

Customizable Attack Scenarios

Our Purple Team Test is built on the most common tactics, techniques, and procedures utilized by bad actors. Your team can even request unique attack scenarios specific to your environment.

Collaborative Engagement

Have you ever felt like you were in the dark during a pentest? With Purple Teaming, your security team can actively participate in the engagement.

Validate Your Investments

Discover how your endpoint protection, network security, security operations center, and personnel perform during a simulated attack.

Logging & Monitoring Review

Our analysts review your internal logging results to ensure testing activity is properly recognized and alerted on.

What to Expect…

During Purple Teaming, our security analysts will leverage common tactics and techniques that your organization could face during a data breach. For each attack vector, your organization can test its ability to detect and respond. After the testing phase, your organization will receive an actionable report outlining each attack vector, testing notes, detection and response results, and information on how to prevent future successful attacks.

Example Techniques

  • Brute Force
  • Man-in-the-Middle
  • Network Service Scanning
  • File and Directory Discovery
  • Credential Dumping
  • Exploitation of Remote Services
  • Account Creation

Validating Your IT Investments

Your IT infrastructure includes a variety of tools and solutions that help keep your networks safe – firewalls, endpoint detection, intrusion detection and prevention, SIEM solutions and more. Once configured in your environment, you expect these tools to properly monitor and log suspicious network activity. Purple teaming is designed to test the effectiveness of your network monitoring in real time. During the collaborative test, our analysts will simulate malicious actions that should be noticed and logged by your solutions. Each testing technique will lead us one of two ways:

Confirm Monitoring & Logging

Was the event properly logged? Great! You now have confirmation that your tools are properly configured to alert you to that suspicious activity.

Improve Configurations

Didn’t see your solutions react? Let’s dive into those settings and see how we can make adjustments to better your detection and logging capabilities.

Elevate your cybersecurity posture today

Our team will respond before your next cup of coffee

Read More About Purple Teaming

What is Purple Team Testing tracesecurity
What is Purple Team Testing?

Purple Team Testing is an extensive cybersecurity defense. Learn more about this advanced penetration test to verify your logging and monitoring capabilities.

Read More