Get actionable application security insights


Discover the assets you own and their general state of security with RedShield's free application security hygiene assessment.

What you'll get

  • An application security hygiene assessment 
  • A report detailing assets within your perimeter, and their general state of security
  • A free consultation with our security experts

Why should you prioritise application security?


of data breaches involved web applications, according to Verizon's 2020 Data Breach Investigations Report.

2 weeks

Kenna Security found that within 2 weeks of publication, over 50% of vulnerabilities already had code available to exploit them.

125 days

is the lowest median speed in which security flaws are fixed, according to Veracode's State of Security Software (vol.11).


Offer details

What does the assessment include?

As part of our free application security hygiene assessment, RedShield will discover the web-facing applications in your perimeter and their general state of security.

The output of this assessment is a report with a list of Fully Qualified Domain Names (FQDN) discovered, and any vulnerabilities identified on each FQDN.

What is an FQDN?

A Fully Qualified Domain Name (FQDN) is the complete domain name of a host, which is needed to make it accessible to the internet.

The FQDN follows the syntax [hostname].[domain].[top-level domain]. For RedShield's public-facing website,, ".co" is the top-level domain, "redshield" is the domain name, and "www." is the hostname.

If you are unsure of how to find your FQDN, please contact us.

What information do you use to produce the report?

To perform the application security hygiene assessment, we use our custom-built Open Source Intelligence (OSINT) scanner – a tool used to collect technical information from a variety of sources, such as Shodan (, Bit Discovery (, and SSL Labs (

How does the process work?

Complete the form, and we'll send you a report within days.

Our security experts are available for a free consultation to discuss the report, provide recommendations on next steps, and answer any questions you may have.

If there are critical findings identified in the report, you may wish to request a free trial. As part of the trial, relevant shields will be deployed to address vulnerabilities identified in the initial report. Configuration can be left in place for up to six weeks if you would like to conduct penetration testing to validate the effectiveness of the shields.