Your defences hold in testing. Do they hold against a real attacker?

    A pentest finds known vulnerabilities. A red team acts like a real adversary: phishing your people, bypassing your perimeter, moving laterally until they reach your crown jewels. Then they deliver a report your board can act on.

    What a red team engagement delivers

    100%
    of engagements find at least one critical path to the defined objective
    3 vectors
    technical, human and physical attack surface tested in a single engagement
    2 reports
    executive narrative for the board and technical annex for your security team
    NIS2
    advanced testing evidence accepted by NIS2 and DORA auditors

    A red team is not a pentest with a bigger scope

    The difference between finding known vulnerabilities and testing whether your defences hold against a real adversary

    What a red team is NOT

    A pentest with a wider scope: a red team has no predefined scope and chains whatever vectors work, from phishing employees to tailgating into your office

    What a Sectricity red team delivers

    Goal-based adversary simulation: we work toward a defined business objective using any realistic attack vector, not a predefined list of systems

    What a red team is NOT

    A compliance checkbox: a passed pentest means no known critical CVEs, it says nothing about whether your SOC would detect lateral movement

    What a Sectricity red team delivers

    Your detection and response under real pressure: we document every step your SOC does and does not detect, producing evidence NIS2 and DORA auditors accept

    What a red team is NOT

    A technical-only exercise: most breaches start with a person, not a port — phishing, vishing and physical intrusion are core red team vectors

    What a Sectricity red team delivers

    Multi-vector engagement: spear-phishing, vishing, physical tailgating and technical exploitation in a single coordinated campaign

    What a red team is NOT

    A one-off report: a red team engagement exercises your detection and response capability, not just your vulnerability surface

    What a Sectricity red team delivers

    Two deliverables: an executive narrative your board can act on and a technical annex with a prioritised remediation backlog for your security team

    What a real red team delivers

    A defined business objective, not a CVE list

    We work towards a goal: domain admin, financial data, customer records. Every attack decision is made in service of that objective, exactly as a real adversary would operate.

    Multi-vector: technical, human and physical in one engagement

    Spear-phishing, vishing, physical tailgating and technical exploitation in a single coordinated campaign. The full attack surface, not just the network perimeter.

    Tests your detection and response, not just prevention

    Does your SOC detect lateral movement? Would an alert fire if credentials were exfiltrated? A red team answers these questions. A pentest does not.

    A board-ready narrative with a remediation roadmap

    Two deliverables: an executive narrative your board can act on, and a technical annex with a prioritised remediation backlog for your security team. NIS2 and DORA evidence included.

    How a Sectricity red team engagement works

    Five structured phases from scoping to debrief. Every step is documented with evidence.

    1. Scoping and rules of engagement

    Define the objective, out-of-scope systems, get-out-of-jail card and escalation protocol. No engagement starts without a signed scope.

    2. Threat intelligence and reconnaissance

    OSINT on targets, email patterns, LinkedIn profiling, exposed infrastructure and physical site survey. We build an attacker picture before touching a single system.

    3. Initial access and foothold

    Spear-phishing, vishing, physical tailgating or technical exploitation, whichever achieves access fastest. Every attempt is documented.

    4. Lateral movement and objective

    From foothold to target objective: escalation, pivoting, persistence and exfiltration. We track every step your SOC does or does not detect.

    5. Debrief, report and remediation

    Executive narrative plus technical report plus remediation roadmap prioritised by actual attacker paths. Post-remediation retest available.

    Who commissions a red team

    When a pentest report is no longer enough.

    CISO: validate your security controls

    You have invested in EDR, SIEM, MFA and awareness training. A red team tells you whether those controls hold against a coordinated adversary. Use the findings to justify next year's security budget with evidence your board understands.

    Compliance: NIS2 and DORA evidence

    NIS2 Article 21 and DORA requirements call for advanced testing beyond vulnerability scanning. An advanced red team engagement produces the documented evidence your auditor expects.

    Board: cyber risk in business terms

    Your board needs to understand risk without CVE scores. Red team reports show the narrative: an attacker could have reached your financial systems in three days, undetected. That drives investment decisions.

    Frequently asked questions

    Find out if your defences hold before an attacker does.

    Book a free scoping call. We discuss your environment, define a realistic objective and tell you what an engagement looks like for your organisation. No commitment.