Case studies

To understand how RedShield might be able to assist with your AppSec requirements, explore some of our successes that map to your requirements.

Managing The Risk Register Post A Boundary Review

THE SITUATION For this mid-sized government department, approximately 100 browser-based applications run process essential data for the organization. Half of these apps are on the Internet as primary websites, customer portals, supplier portals and APIs for mobile...

read more

Shielding The Harvest Of Online Offers

THE SITUATION Online offers boost sales – no doubt. This company publishes online offers on specific dates and site visitors validate with email authentication to receive the offers. However, analysis of the traffic revealed the presence of scripters, harvesting the...

read more

Protecting HIPAA-Compliant Online Forms

THE SITUATION As a cloud-based, client management software service provider serving the healthcare sector, storing and protecting Public Health Information (PHI) is an ongoing concern. As such, HIPAA compliance is mandatory. And as part of this compliance, experts...

read more

Protecting A Hybrid Cloud And On-Premise Deployment

THE SITUATION A company wanted to move their ecommerce store workload to Amazon Web Services (AWS) but retain their customer care workloads in their own datacenters. They wanted ultimate flexibility for everything else; test and dev environment on premise and the...

read more

Inadvertently Blocking Legitimate Traffic

THE SITUATION A large government agency using Microsoft SharePoint had been attempting to put important security controls in place for years. Using various vendors and highly skilled system integrator resources, they attempted to get WAF protection in place. However,...

read more

Improving The Public Ranking In Health Companies Security Report

All the healthcare company had to provide was the hostname, SSL cert and any vulnerability data. Then once RedShield had completed the setup, run compatible tests and submit then execute a change request to change DNS and lock down the perimeter firewall. All the security related tasks in both setup and ongoing operations were performed by RedShield. As a result migration could occur quickly.

read more

Loss Of PCI Accreditation

THE SITUATION As a payment transaction company processing millions of commercial transactions each day, maintaining the appropriate accreditation is a fundamental business requirement. Losing the regulatory ability to store and process customer credit card details...

read more

Response To A Hacktivism Political Protest

THE SITUATION After a public threat from a well-known hacktivist group, a prominent political party’s websites were subjected to sustained cyber attacks. The sites were taken down repeatedly with additional concerns of potential database exfiltration. A phone call to...

read more

Test drive RedShield

During a test drive, you can see the value of RedShield on one of your websites.
We'll help you make your vulnerabilities vanish, removing the ability to exploit completely.

Discovery call

If you’d prefer one of our consultants to reach out to you as a first step, please leave your contact details.

Test drive RedShield

If you wish to take RedShield for a test drive automatically, you can get started in just a few minutes.