Case Studies

Learn more about how RedShield works through this comprehensive collection of case studies.

An Alternative to Application Redevelopment

A large, national health insurance provider conducted a routine penetration test on a critical web application uncovering a critical flaw.

Read More

Sharepoint Security Controls Inadvertently Blocking Legitimate Traffic

A large government agency using Microsoft SharePoint had been attempting to put important security controls in place for years.

Read More

API protection between financial institutions

A large insurance company was introducing a new application platform where their digital insurance products were to be white-labeled to partner bank websites.

Read More

Post breach protection of a financial portal

In the financial portfolio management business, the customer web portal is both critical to business continuity and customer experience and expensive to modify.

Read More

Response to a hacktivism political protest

After a public threat from a well-known hacktivist group, a prominent political party’s websites were subjected to sustained cyber attacks.

Read More

Protecting a hybrid cloud and on-premise deployment

A company wanted to move their ecommerce store workload to Amazon Web Services (AWS) but retain their customer care workloads in their own datacenters.

Read More

Specific design to address HIPAA requirements

As a cloud-based, client management software service provider serving the healthcare sector, storing and protecting Public Health Information (PHI) is an ongoing concern.

Read More

Security Patches unavailable for COTS software

As a power retailer maintaining millions of customer accounts, security of financial systems is central to the privacy of the customer and success of the business.

Read More

Harvesting of online offers

Online offers boost sales – no doubt. This company publishes online offers on specific dates and site visitors validate with email authentication to receive the offers.

Read More

At risk of losing PCI accreditation

As a payment transaction company processing millions of commercial transactions each day, maintaining the appropriate accreditation is a fundamental business requirement.

Read More

Deployment of a RedShield private node in the cloud

For large payment transaction providers, policy and regulatory requirements must be met while simultaneously optimizing cost.

Read More

Failed pen tests risking a key client’s tenure

An existing RedShield customer outsourced key operations functions to an online service provider.

Read More

Rapidly addressing 100s of issues post Boundary Review

For this mid-sized government department, approximately 100 browser-based applications run process essential data for the organization.

Read More

Deferring a security related COTS software upgrade

When public sector entities merge, IT system harmony and cost reductions are the order of the day; especially when the public is listening.

Read More

Application not designed to be secure

A major logistics company had followed a tender process to commission a complete logistics management application to move its entire operation to the web.

Read More

Protecting Commercially Sensitive Information

A large financial services company that regularly publishes commercially sensitive indicies was subject to extremely large legitimate traffic spikes that also contained malicious traffic.

Read More

Customer Portal Offline

A large organisation's customer portal has been exposed as insecure. RedShield provides a rapid solution to get it secure and back online.

Read More

Retail Chain Requiring Expert Vulnerability Management

Retail chain facing security threats over an extensive perimiter turns to RedShield to provide the solution.

Read More

Replacement of a self managed Leading WAF

A Global Telco had a range of legacy applications not under active development, but requiring ongoing PCI compliance. Their self managed WAF solution was not capable of not addressing the reported flaws whilst also disrupting CX.

Read More

Accelerating a CI-CD pipeline

A US Healthcare Provider and Payer fully dedicated to digitally transforming their business required both optimal speed from their CI/CD pipeline, but could not compromise on security.






Read More

Minimizing SW Releases Whilst Maintaining Security Bug Fix Agility

An Insurer had finished functional development on a range of applications and was looking for a way to move the applications to maintenance whilst being able to respond rapidly to reported security issues.

Read More

Optimising Customer Experience whilst upgrading SSL security

A Power Utility needed to improve SSL security for compliance , but just turning parts of the technology off would mean the app would just stop working for some customers.





Read More

Changing App logic to Address a password reuse attack

A loyalty card company was subject to a password reuse attack, changing the behaviour of their login process was required to address it. But how do that in near real time when the devs had already left for the day.

Read More

Fixing SQLi not just Blocking

A large bank discovered SQLi in one of their client facing apps. Given the criticality of the app and blocking being mathematically proven to be a partial solution, they needed something more inline with what developers would do, fast.




Read More

Securing Win Server 2003 and 2008 Web Apps

A university had a number of web apps running on unsupported platforms. Replacing and replatforming of everything takes time, but attackers never sleep.

Read More

Securing a 3rd party hosted app that can't be touched

A government agency had some business critical applications that didn’t even support encrypted communication but could not be touched to secure.

Read More

Improving the Health Industry Wide Security Ranking

As a security enhancement to their brand, a healthcare company desired to improve their ranking in the Risk Reconn survey. But how to address the problems the tools highlight with a small security team?

Read More