Three engagement modes
Stealth red team, assumed-breach or collaborative purple team - right-sized to your SOC maturity, not forced into a one-size-fits-all template.
Intelligence-led adversary simulation measured in MITRE ATT&CK coverage, detection latency and response gaps - not CVSS scores.
Red and purple team engagements go beyond vulnerability discovery. We replicate a real adversary's journey - from initial access through objective completion - testing whether your detection and response capabilities hold when it counts. Engagements run in three modes: classic stealth red team with your SOC unaware, assumed-breach starting from a known foothold, or collaborative purple team with red and blue working side-by-side so detections are tuned in real time. Outcomes are measured in MITRE ATT&CK technique coverage, detection latency per tactic, and response gap analysis - not CVSS numbers. Physical, social, cloud and network objectives all on the table.
Deep dive into the capabilitiesThe same named team stays with you from kick-off through delivery. Engagements are shaped to your risk profile, not our template library.
Stealth red team, assumed-breach or collaborative purple team - right-sized to your SOC maturity, not forced into a one-size-fits-all template.
Every engagement produces a technique-coverage matrix showing which of the 200+ TTPs you detected, missed or prevented.
Detection rules, hunt queries and runbook updates handed to your SOC during the engagement, not months after a PDF lands.
Cyber, physical, social engineering and cloud objectives in a single scope. Organised-crime TTPs, not an internal pen test with a new name.
Every engagement follows the same six-step CREST-aligned methodology. You get visibility into every phase and an audit trail of every action taken by the test team.
Select adversary, define objectives, agree rules of engagement and scope safeguards with your exec sponsor.
Passive and active OSINT, social media mapping and attack-surface discovery - not targeting your asset register.
Weaponised phishing, credential stuffing, supply-chain or physical vectors depending on the agreed scope.
Persistence, C2 infrastructure, defence evasion and elevation to an operational beachhead ready for actions on objective.
Lateral movement, privilege escalation, data discovery and objective completion under live monitoring.
Technique-by-technique replay with your SOC, detection content handover and prioritised tuning recommendations.
No tiered upsells, no "platinum" package. What you see is what you get - one contract, one team, one number to call.
APT-style campaigns modelled on threat actors actively targeting your sector and region - not generic playbook content.
Phishing, voice pretext, targeted spear-phishing and business-email-compromise simulations with measurable human-layer metrics.
On-site tailgating, lock-bypass, device-drop and badge-cloning assessments with agreed scoping safeguards and damage controls.
AWS, Azure and GCP lateral-movement scenarios including IAM role chaining, token theft and cross-tenant escalation.
Hypothesis-driven hunts paired with your blue team to find blind spots in SIEM content, EDR coverage and hunt queries.
Live detection tuning during engagement with delivered hunt queries, SIEM analytic content and runbook updates.
Every engagement runs through a unified portal. Scope, schedule, consume findings and measure the program across years of history - without a single PDF attachment hitting your inbox.
Identify which TTPs your current stack can't see, ranked by real-world exploitation frequency in your sector.
Cold-hard numbers on how long each attack phase takes to detect, escalate and contain - per tactic, per host, per team.
Tests whether your outsourced SOC actually delivers what the SLA claims, not just whether alerts fire.
Full-chain attack rehearsal so your IR runbooks are proven under pressure before the real adversary applies them.
Executive narrative translating TTP coverage into business risk, regulatory exposure and remediation spend priority.
Remediation roadmap mapped directly to ATT&CK tactics so your SOC can sequence uplift against the gaps that matter most.
Measurable, reportable, auditable - every outcome tracks to a control in your compliance framework.
MITRE ATT&CK technique coverage matrix showing detected vs missed vs prevented tactics
Cold-numbers detection latency measurement per TTP and per attack phase
Response-gap analysis ranked by exploitation frequency and business impact
Hardened SOC detection content - SIEM rules, hunt queries and runbooks delivered during the engagement
Executive-level narrative report and regulator-facing evidence pack suitable for APRA and SOCI submission
Can't find the answer here? The team responds to scoping queries within one business day - usually faster.
Ask the team directlyA pen test finds as many vulnerabilities as possible within a defined scope. A red team replicates a real adversary pursuing a specific objective - exfiltrate customer data, compromise the admin domain, move money. Red team measures detection and response; pen test measures vulnerability coverage.
Red team operates covertly - your SOC doesn't know the engagement is running. Purple team operates collaboratively - red and blue in the same room, tuning detections as attacks run. We do both, and most mature customers alternate between modes across years.
Depends on the mode. Classic red teams are stealth - only the executive sponsor and one or two safety stakeholders know. Purple teams are openly collaborative. Assumed-breach engagements can go either way. We agree communications discipline at kick-off.
For a stealth red team, enough maturity that you'd actually expect to catch something matters - otherwise the engagement proves nothing. Purple teaming is the right first step for less-mature SOCs; we help you build detection as we run the attacks.
Yes, when scope permits. Tailgating, lock-bypass, device-drops, badge cloning and social-engineering entry are all on the table - with agreed damage controls, legal authorisation and a physical safety plan.
Rules of engagement documented with the exec sponsor, pre-approved destructive-action restrictions, live bridge to your security lead during all on-target phases, and agreed kill-switches for any action that risks availability.
Three artefacts: (1) an executive narrative for the board, (2) a technical report with full chain-of-evidence and ATT&CK matrix, and (3) a SOC package containing detection content, hunt queries and prioritised uplift recommendations.
Talk to an engineer - not a call centre. Most Vectra conversations start with a 30-minute technical briefing and end with a written plan.