Explore our resources

Resources

Security is a complex and ever-changing field. We compile and make available a host of materials we believe can help the security community as a whole, and help our customers stay safer.

Presentations

A collection of our past presentations and demonstrations that will help shed some light on topics addressed.  From slide decks to video to live events – we’ve got you covered.

n

Case studies

To understand how RedShield might be able to assist with your AppSec requirements, explore some of our successes that map to your requirements.

i

Whitepapers

As leaders within the AppSec community, we have created authoritative materials based on our experience, as well as unique research we’ve conducted, and make that knowledge available here.

Presentations

A more structured to learning about application security and how RedShield fits into the equation. We offer several streams – the most relevant for our customers – to help them fill in any knowledge gaps and understand the bigger picture. 

Case studies

A more structured to learning about application security and how RedShield fits into the equation. We offer several streams – the most relevant for our customers – to help them fill in any knowledge gaps and understand the bigger picture. 

Effective And Compatible Protection Replacement Of MQ Cloud WAF

THE SITUATION After 3 year program of work, a tier-one APAC bank was ready to assess the effectiveness of their WAF deployment that had been configured to protect their key online assets. Given the strict requirements the bank has for both minimum legitimate service...

Brazilian Crime Syndicate Cardwashing Attack

THE SITUATION As a payment transaction company processing millions of commercial transactions each day, ensuring the security of payment data is a fundamental business requirement. Cybercrime involving fraud, specifically payment card fraud has increased dramatically,...

Improving The Public Ranking In Health Companies Security Report

THE SITUATION A health care company was embarking on a company wide digital transformation program to achieve service delivery efficiencies and to rebrand in as tech lead. Performing this securely was not negotiable, but to build it into a brand dimension that could...

Whitepapers 

A more structured to learning about application security and how RedShield fits into the equation. We offer several streams—the most relevant for our customers—to help them fill in any knowledge gaps and understand the bigger picture. 

Secure Session Management

What is a Session? A session is the period of time, post login, that the application is in communication with a user without requiring the user to re-authenticate. The typical mechanism used for this is to assign an HTTP Cookie unique to the session, hence  attacks on...

Shields Are Not Custom Waf Rules. Know The Difference

Shield A shield is a block of code that modifies application behaviour to fix a known exploitable vulnerability. Like a micro service, it becomes a functional part of the application. For the exploitable flaw to be secured, all traffic must flow through the shield,...

Cloud Application Security – Shared Responsibility

The Preconceived Cloud Security Problem Businesses are overwhelming realizing the benefits of adopting cloud infrastructure strategies. Software, Platform and Infrastructure “As A Service” options are supporting wholesale Digital Transformation for small to medium...

Test drive RedShield

During a test drive, you can see the value of RedShield on one of your websites.
We’ll help you make your vulnerabilities vanish, removing the ability to exploit completely.

Discovery call

If you’d prefer one of our consultants to reach out to you as a first step, please leave your contact details.

Test drive RedShield

If you wish to take RedShield for a test drive automatically, you can get started in just a few minutes.