This profile is not managed yet, if you would like to manage
this profile, please contact us at team@asiagrowthpartners.com
Redscan Logo

Redscan

United Kingdom
London
2002
Private
$10-100m
51 - 200
Open website

Redscan, A Kroll Business, is an award-winning provider of managed security services, specializing in Managed Detection and Response, Penetration Testing, and Red Teaming. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify, contain and shut down breaches.

Read More
Redscan is a provider of Industrial IoT cybersecurity and privacy, infrastructure as a service (iaas), sensors, drones, analytics and modeling, and networks and connectivity technologies, and also active in the buildings, cement, education, equipment and machinery, finance and insurance, healthcare and hospitals, marine and shipping, national security and defense, packaging, and plastics industries.
Technologies
Cybersecurity & Privacy
Application Security
Endpoint Security
Identity & Authentication Management
Intrusion Detection
Malware Protection
Network Security
Security Compliance
Infrastructure as a Service (IaaS)
Cloud Computing
Hybrid Cloud
Public Cloud
Sensors
Level Sensors
Networks & Connectivity
5G
Drones
Flight & Control Systems
Analytics & Modeling
Digital Twin / Simulation
Use Cases
Asset Lifecycle Management
Cybersecurity
Experimentation Automation
Intrusion Detection Systems
Structural Health Monitoring
Supply Chain Visibility
Tamper Detection
Usage-Based Insurance
Functions
Logistics & Transportation
Procurement
Quality Assurance
Industries
Buildings
Cement
Education
Equipment & Machinery
Finance & Insurance
Healthcare & Hospitals
Marine & Shipping
National Security & Defense
Packaging
Plastics
Services
Cloud Planning, Design & Implementation Services
Cybersecurity Services
Testing & Certification
Training
Redscan’s Technology Stack maps Redscan’s participation in the cybersecurity and privacy, infrastructure as a service (iaas), sensors, drones, analytics and modeling, and networks and connectivity IoT technology stack.
  • Application Layer
  • Functional Applications
  • Cloud Layer
  • Platform as a Service
    Infrastructure as a Service
  • Edge Layer
  • Automation & Control
    Processors & Edge Intelligence
    Actuators
    Sensors
  • Devices Layer
  • Robots
    Drones
    Wearables
  • Supporting Technologies
  • Analytics & Modeling
    Application Infrastructure & Middleware
    Cybersecurity & Privacy
    Networks & Connectivity
Technological Capability
None
Minor
Moderate
Strong
Number of Case Studies12
Enhancing Network Security in Asset Management: A Case Study
The case study revolves around an independent global asset management firm with prestigious corporate investors and banking partners. The firm is responsible for managing assets for a wide range of clients and is acutely aware of its responsibility to protect all related information. The firm had antivirus software and firewalls in place, which provided an essential first line of defense. However, if hackers or malware were to penetrate these barriers, it had no means of monitoring its IT infrastructure to detect unauthorized activity on its network. The firm also needed to ensure that there were no weaknesses in its own network that might be exploited by hackers as a means of infiltrating the networks of its many financial partners. The firm was comfortable that it complied with the IT security standards set out by the Financial Conduct Authority (FCA) in the UK, and other similar regulatory bodies around the world, but it anticipated that these industry requirements would soon become more stringent.
Proactive Cyber Security Measures for a Global Shipping Company
The case study revolves around a global shipping company, one of the largest in the world, with over 135 years of experience in the industry. The company manages around 600 vessels and employs 20,000 people on shore and at sea, through nine ship management centres worldwide. The company was aware of the potential damage cybercrime could inflict on its operations, finances, and reputation, especially after the NotPetya malware attack on Maersk in 2017. The company had some security controls in place, but these did not provide visibility across its complete hybrid cloud infrastructure, including Office 365. They also lacked confidence that attacks would be identified quickly enough to minimise potential damage and disruption. With a relatively small number of IT specialists for its size, the company sought a third party to help with day-to-day threat detection, enable a more proactive approach to cyber security, and mitigate future security risks. They also needed to ensure that appropriate controls and processes were in place to meet all its data protection obligations, including the ability to detect and report breaches in line with the GDPR.
Leveraging EDR to Combat Advanced Malware Threats in Healthcare
A private healthcare organisation in the UK, which processes large volumes of sensitive patient data, was targeted by a sophisticated type of malware. The malware aimed to harvest employee credentials and exfiltrate data. The organisation was already using Redscan’s Managed Endpoint Detection and Response service to protect its data beyond the level of security offered by traditional perimeter solutions. However, the malware attack posed a significant threat to the organisation's operations and the security of patient details. The challenge was to quickly identify, investigate, and respond to the attack to minimise operational disruption and prevent patient details from being stolen.
Download PDF Version
test test