{"id":616,"date":"2025-05-03T09:50:44","date_gmt":"2025-05-03T09:50:44","guid":{"rendered":"https:\/\/meridian-group.eu\/?page_id=616"},"modified":"2025-05-05T15:06:03","modified_gmt":"2025-05-05T15:06:03","slug":"red-team-meridian","status":"publish","type":"page","link":"https:\/\/meridian-group.eu\/en\/red-team-meridian\/","title":{"rendered":"Red Teaming"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"616\" class=\"elementor elementor-616\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bc22b68 e-flex e-con-boxed e-con e-parent\" data-id=\"2bc22b68\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6f4246d2 e-con-full e-flex e-con e-child\" data-id=\"6f4246d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-19a65ace e-con-full e-flex e-con e-child\" data-id=\"19a65ace\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ff58ccb elementor-widget elementor-widget-text-editor\" data-id=\"6ff58ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Red Teaming service is designed for organizations with a solid level of cyber maturity that seek to test their defensive capabilities in a realistic, measurable scenario aimed at continuous improvement.<br data-start=\"2607\" data-end=\"2610\">\u00c8 essenziale per settori regolamentati dove la validazione delle difese e dei playbook \u00e8 richiesta da framework come TIBER-EU, DORA o ISO\/IEC 27001, e rappresenta un\u2019opportunit\u00e0 concreta per anticipare l\u2019attaccante, migliorare la detection e addestrare il team blu in condizioni reali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f2e29d elementor-widget elementor-widget-text-editor\" data-id=\"7f2e29d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>All activities are non-destructive, controlled, and thoroughly documented, and are conducted in full compliance with rules of engagement (ROE), regulatory frameworks, and corporate policies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50605db2 e-con-full e-flex e-con e-child\" data-id=\"50605db2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b5fd707 elementor-widget elementor-widget-image\" data-id=\"7b5fd707\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/meridian-group.eu\/wp-content\/uploads\/2025\/05\/hacker-working-using-computer-with-codes-2025-02-10-14-32-13-utc-1024x683.jpg\" class=\"attachment-large size-large wp-image-135\" alt=\"\" srcset=\"https:\/\/meridian-group.eu\/wp-content\/uploads\/2025\/05\/hacker-working-using-computer-with-codes-2025-02-10-14-32-13-utc-1024x683.jpg 1024w, https:\/\/meridian-group.eu\/wp-content\/uploads\/2025\/05\/hacker-working-using-computer-with-codes-2025-02-10-14-32-13-utc-300x200.jpg 300w, https:\/\/meridian-group.eu\/wp-content\/uploads\/2025\/05\/hacker-working-using-computer-with-codes-2025-02-10-14-32-13-utc-768x513.jpg 768w, https:\/\/meridian-group.eu\/wp-content\/uploads\/2025\/05\/hacker-working-using-computer-with-codes-2025-02-10-14-32-13-utc-1536x1025.jpg 1536w, https:\/\/meridian-group.eu\/wp-content\/uploads\/2025\/05\/hacker-working-using-computer-with-codes-2025-02-10-14-32-13-utc-2048x1367.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66e5c69a elementor-widget elementor-widget-heading\" data-id=\"66e5c69a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Real-world attack simulations to test the organization\u2019s response capabilities.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98c7043 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"98c7043\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33d4db01 elementor-widget elementor-widget-text-editor\" data-id=\"33d4db01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"346\" data-end=\"928\">Xfensive\u2019s Red Teaming service is designed to realistically challenge an organization\u2019s ability to defend against, respond to, and contain advanced, sophisticated, and targeted attacks.<br data-start=\"645\" data-end=\"648\" \/>This is not a standard penetration test, but a comprehensive, multi-vector, APT-like simulation, built around a threat model aligned with the organization\u2019s profile, exposed vulnerabilities, digital footprint, and internal processes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Il servizio di Red Teaming si rivolge a organizzazioni con un buon livello di maturit\u00e0 cyber, che desiderano testare le proprie capacit\u00e0 difensive in uno scenario realistico, misurabile e utile per il miglioramento continuo.\u00c8 essenziale per settori regolamentati dove la validazione delle difese e dei playbook \u00e8 richiesta da framework come TIBER-EU, DORA o ISO\/IEC [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-616","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/meridian-group.eu\/en\/wp-json\/wp\/v2\/pages\/616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/meridian-group.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/meridian-group.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/meridian-group.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/meridian-group.eu\/en\/wp-json\/wp\/v2\/comments?post=616"}],"version-history":[{"count":22,"href":"https:\/\/meridian-group.eu\/en\/wp-json\/wp\/v2\/pages\/616\/revisions"}],"predecessor-version":[{"id":975,"href":"https:\/\/meridian-group.eu\/en\/wp-json\/wp\/v2\/pages\/616\/revisions\/975"}],"wp:attachment":[{"href":"https:\/\/meridian-group.eu\/en\/wp-json\/wp\/v2\/media?parent=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}