Introducing Trebuchet a Red Maple Technologies file sharing product - the simple and secure way to send and receive files privately with end-to-end encryption

Services

The combined experience of our team is both broad and deep, so there’s a good chance we can help you with any technical or cyber security problem. Additionally, we’re not the types to say yes to anything; if there’s a task that isn’t worth doing or is better done by someone else then that’s what we’ll tell you.
Discover

Discover

Understand your attack surfaces, whether online or internal.

  • Online risk assessment using FractalScan. Using our own attack surface mapping tool, we can walk you through your online assets and any vulnerabilities or issues they may have.
  • Network security survey of internal networks, to discover assets and vulnerabilities that an attacker inside your network could exploit.
  • Bespoke Research. Our clients trust us to solve some of their hardest problems. Whether in-depth and technical or more high-level, we can deliver expert cyber security research.
Improve

Improve

Security is never finished, and we can help you improve to the next level. We're more than just a testing shop, we can fix issues for you, and even build the next version.

  • Code Review/Development Process Review – don’t feel you’re still getting value from those six-monthly penetration tests? If not, why not take a step back and look at how you build things. We can help improve the process behind everything you build
  • Maturity Assessment - if you’re not sure where you are with different elements of cyber security, we can craft a scope to consider as many elements as you need.
  • M365 configuration - if you don’t have time to implement a report full of findings, we can work with you to improve the security of your Microsoft 365 tenant.
  • Virtual CISO - if you don’t have someone to provide cyber security strategy, we can fill the gap with a virtual CISO service.
Evaluate

Evaluate

If it is online or in use, it will benefit from being regularly tested. We prefer to deliver in-depth, focussed tests that result in findings worth fixing.

  • Web and mobile application tests - we combine our development and security expertise to test everything an attacker would.
  • Cloud Infrastructure Test - We offer holistic and focussed cloud security reviews. We use GCP and IONOS ourselves for our own and our customers solutions, but are also experienced in both AWS and Azure.
  • M365 security audit - We have custom tools to perform security tests and audit of all parts of a Microsoft 365 tenant.
  • Hardware Security Tests - Some of our staff specialise in hardware security. Whether consumer or industrial, we can test what an attacker could achieve if they get their hands on your devices.
Respond

Respond

You cannot prevent every attack, but we can help you in the event of any incident with incident management, digital forensics and technical investigation.

  • Breach or compromise investigation - whatever the cause, we can help to remediate the issue, manage the fallout, and get you back on track.
  • Digital Forensics - we specialise in digital forensics of mobile devices, including malware or compromise investigation. We partner with an industry-leading acquisition capability, and have bespoke tools for inspecting extracted data.
  • Internal investigation - we can use log, network and device forensics to investigate internal incidents. Our staff are experience in evidential procedures and UK law.

We use cookies to analyse website traffic and to facilitate comments on our blogs. By continuing you agree to our cookie policy.