{"id":26591,"date":"2025-10-23T13:41:21","date_gmt":"2025-10-23T08:11:21","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=26591"},"modified":"2025-10-23T13:42:29","modified_gmt":"2025-10-23T08:12:29","slug":"strategic-value-of-red-teaming-for-modern-enterprises","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/strategic-value-of-red-teaming-for-modern-enterprises\/","title":{"rendered":"Strategic Value of Red Teaming for Modern Enterprises"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26591\" class=\"elementor elementor-26591\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13cf5d2 e-flex e-con-boxed e-con e-parent\" data-id=\"13cf5d2\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c215fa3 elementor-widget elementor-widget-heading\" data-id=\"c215fa3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Moving From \u2018Inside-Out\u2019 To \u2018Outside-In\u2019 Cybersecurity Strategies<span style=\"font-size: 2.5rem; font-style: inherit;\"><\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8e5665 e-flex e-con-boxed e-con e-parent\" data-id=\"c8e5665\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-197d45e elementor-widget elementor-widget-text-editor\" data-id=\"197d45e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"color: #000000;\">\u2018Inside-out\u2019 security &#8211; relying on internal defenses, controls, policies, patching, and monitoring to protect against external threats &#8211; has long been the baseline for enterprise cybersecurity. Yet, this strategy is being rendered increasingly redundant in today\u2019s modern attack landscape, where Indian enterprises are facing:<\/span><\/p><ul><li><span style=\"color: #000000;\"><strong>More Attacks:\u00a0<\/strong>In 2024, India saw roughly <a href=\"https:\/\/www.seqrite.com\/india-cyber-threat-report-2025\/\" target=\"_blank\" rel=\"noopener\">370 million malware attacks<\/a> across 8.44 million endpoints &#8211; that\u2019s a staggering figure that equates to about 702 detections per minute.\u00a0<\/span><\/li><li><span style=\"color: #000000;\"><strong>Greater Complexity:<\/strong>\u00a0According to a recent <a href=\"https:\/\/blog.barracuda.com\/2024\/10\/15\/survey-sees-cyberattacks-gaining-ai-sophistication\" target=\"_blank\" rel=\"noopener\">Barracuda survey<\/a>, 95% of IT leaders say cyberattacks are becoming more sophisticated than ever, with 51% of respondents identifying AI-powered attacks as a top threat vector.\u00a0<\/span><\/li><li><span style=\"color: #000000;\"><strong>Less Visibility:\u00a0<\/strong>A recent <a href=\"https:\/\/www.infopercept.com\/press-release\/indian-enterprises-cybersecurity-visibility-survey-2025\" target=\"_blank\" rel=\"noopener\">survey by CRN<\/a> of large Indian organizations found that 84% of CISOs report lacking full visibility into their cyber exposures &#8211; meaning many attack paths simply aren\u2019t visible to defenders.<\/span><\/li><li><span style=\"color: #000000;\"><strong>More Dwell Time:<\/strong>\u00a0In India, incidents that spanned multiple environments took the longest to identify and contain (<a href=\"https:\/\/in.newsroom.ibm.com\/2024-07-31-IBM-Report-Escalating-Data-Breach-Disruption-Pushes-Average-Cost-of-a-Data-Breach-in-India-to-All-Time-High-of-INR-195-Million-in-2024\" target=\"_blank\" rel=\"noopener\">327 days<\/a>), and organizations with breach lifecycles over 200 days incurred noticeably higher costs than those that remediated faster<\/span><\/li><li><span style=\"color: #000000;\"><strong>Higher Financial Fallout:\u00a0<\/strong>In 2024, the average cost of a data breach hit <a href=\"https:\/\/in.newsroom.ibm.com\/2024-07-31-IBM-Report-Escalating-Data-Breach-Disruption-Pushes-Average-Cost-of-a-Data-Breach-in-India-to-All-Time-High-of-INR-195-Million-in-2024\" target=\"_blank\" rel=\"noopener\">\u20b9195 million<\/a>, with lost business and compliance costs driving the increase. Faster detection and containment materially reduce those costs.<\/span><\/li><\/ul><div><p><span style=\"color: #000000;\">This combination of factors is exactly what breaks an inside-out security model: if you can\u2019t see an exposure, if attackers can leverage advanced tools like AI, and if detection is slow, then these controls and point tools will miss the chains and pathways today\u2019s cyberattacker targets to find a way in.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">That\u2019s why enterprises are turning to \u2018outside-in\u2019 approaches that intentionally view your environment from an attacker\u2019s perspective. The goal is simple &#8211; find the gaps an external adversary would see, before they actually do.\u00a0<\/span><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b9a097 e-flex e-con-boxed e-con e-parent\" data-id=\"4b9a097\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aa29641 elementor-widget elementor-widget-heading\" data-id=\"aa29641\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Red Teaming Is The Best \u2018Outside-In\u2019 Option<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80e32d4 e-flex e-con-boxed e-con e-parent\" data-id=\"80e32d4\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a45e50 elementor-widget elementor-widget-text-editor\" data-id=\"8a45e50\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">Once enterprises realize that \u2018outside-in\u2019 security is best suited to keep pace with modern threats, the next question becomes: what is the best outside-in option out there?\u00a0<\/span><\/p><p><span style=\"color: #000000;\">Among all adversarial simulation models &#8211; vulnerability assessments, penetration testing, purple teaming, red teaming stands apart as the most comprehensive, intelligence-driven approach. Red teaming is a goal-oriented simulation of real-world attack campaigns, designed to test how well your people, processes, and technology detect and respond under pressure. Unlike other simulation tactics, red teaming operates with stealth and persistence, mirroring genuine threat actors\u2019 tactics and techniques to get your organization ready for today\u2019s evolving attack landscape.<\/span><\/p><p><span style=\"color: #000000;\">Here\u2019s how red teaming stands out among adversarial simulation solutions:<\/span><\/p><table><tbody><tr><td><p><span style=\"color: #000000;\"><b>Parameters<\/b><\/span><\/p><\/td><td><p><span style=\"color: #000000;\"><b>Penetration Testing<\/b><\/span><\/p><\/td><td><p><span style=\"color: #000000;\"><b>Purple Teaming<\/b><\/span><\/p><\/td><td><p><span style=\"color: #000000;\"><b>Red Teaming<\/b><\/span><\/p><\/td><\/tr><tr><td><p><span style=\"color: #000000;\"><b>Primary Objective<\/b><\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Uncover vulnerabilities in a defined scope<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Collaborative detection &amp; response improvement<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Simulating relevant live attack campaigns across enterprise stack<\/span><\/p><\/td><\/tr><tr><td><p><span style=\"color: #000000;\"><b>Realism &amp; Stealth Level<\/b><\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Low<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Moderate<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">High (multi-vector, high-stealth persistence)<\/span><\/p><\/td><\/tr><tr><td><p><span style=\"color: #000000;\"><b>Scope Of Testing<\/b><\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Specific systems or apps<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Systems + SOC Processes<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">End-to-end across people, processes &amp; technology<\/span><\/p><\/td><\/tr><tr><td><p><span style=\"color: #000000;\"><b>Level Of Detection &amp; Response Testing<\/b><\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Only Partial<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Sufficient due to joint testing processes<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Deep &amp; Rooted in Reality<\/span><\/p><\/td><\/tr><tr><td><p><span style=\"color: #000000;\"><b>Level Of Business Insight Generated\u00a0<\/b><\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Medium &#8211; serves to validate control effectiveness<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">High &#8211; provides learnings to your defenders<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Very High &#8211; quantifies breach impact &amp; readiness ROI<\/span><\/p><\/td><\/tr><tr><td><p><span style=\"color: #000000;\"><b>Cost vs. Value Outcome<\/b><\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Low Cost + Low Insight<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Moderate Cost + Good Level Of Learnings<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Higher Cost + Highest Strategic Value<\/span><\/p><\/td><\/tr><tr><td><p><span style=\"color: #000000;\"><b>Typical Use Cases<\/b><\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Validation before go-live<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">SOC maturity building<\/span><\/p><\/td><td><p><span style=\"font-weight: 400; color: #000000;\">Enterprise-wide resilience testing &amp; executive reporting<\/span><\/p><\/td><\/tr><\/tbody><\/table><div><div dir=\"ltr\" style=\"margin-left: 0pt;\" align=\"left\"><p><span style=\"color: #000000;\">In essence, red teaming delivers intelligence on not just the state of your controls, but the effectiveness of your organization under attack &#8211; giving your organization high levels of ROI in ways we\u2019ll explore later in the blog.<\/span><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f54a48 e-flex e-con-boxed e-con e-parent\" data-id=\"3f54a48\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1db269 elementor-widget elementor-widget-heading\" data-id=\"b1db269\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">iValue\u2019s Red Teaming Stack: The Industry-Leading Outside-In Solution<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d79d73 e-flex e-con-boxed e-con e-parent\" data-id=\"2d79d73\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5697eef elementor-widget elementor-widget-text-editor\" data-id=\"5697eef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">Enterprises today face dynamic, adaptive adversaries who move faster than traditional defenses. iValue\u2019s Red Teaming Stack is built for this new reality &#8211; a unified adversarial simulation framework that blends visibility, offense and intelligence into one cohesive solution.<\/span><\/p><p><span style=\"color: #000000;\">Unlike fragmented testing tools, this stack continuously thinks and acts like an attacker &#8211; revealing exposures, validating defenses and helping security teams stay ahead of evolving threats. What makes it industry-leading is the strategic fusion of three world-class capabilities, each powered by a best-in-class OEM partner:<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-adb281a e-flex e-con-boxed e-con e-parent\" data-id=\"adb281a\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5667e6 elementor-widget elementor-widget-text-editor\" data-id=\"c5667e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong><span style=\"color: #000000;\">External Attack Surface Discovery &#8211;\u00a0Powered By Tenable:\u00a0<\/span><\/strong><\/p><p><span style=\"color: #000000;\">Tenable provides complete visibility into your external footprint &#8211; every Internet-facing asset, cloud instance or exposed service an attacker could find.\u00a0<\/span><br \/><span style=\"color: #000000;\">\u00a0<\/span><br \/><span style=\"color: #000000;\"><strong>Key Strengths:<\/strong><\/span><\/p><ul><li><span style=\"color: #000000;\">Full-spectrum external asset discovery &amp; inventory<\/span><\/li><li><span style=\"color: #000000;\">Contextual risk prioritization of exposed assets<\/span><\/li><li><span style=\"color: #000000;\">Continuous monitoring of changing attack surfaces<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffe3764 elementor-widget elementor-widget-image\" data-id=\"ffe3764\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-in\/tenable-ivalue-group\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"123\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2021\/12\/Tenable.jpg\" class=\"attachment-large size-large wp-image-3744\" alt=\"Tenable\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-957f30a e-flex e-con-boxed e-con e-parent\" data-id=\"957f30a\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84c4d1e elementor-widget elementor-widget-text-editor\" data-id=\"84c4d1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong><span style=\"color: #000000;\">Best-In-Class Offensive Tooling:\u00a0<\/span><span style=\"color: #000000; font-style: inherit;\">Brought By Kali<\/span><\/strong><\/p><p><span style=\"color: #000000;\">Kali equips iValue\u2019s red teams with the most trusted offensive toolkit in cybersecurity. It simulates real-world attack behaviour &#8211; from initial access to lateral movement &#8211; to test how well your people, processes and technologies respond under pressure.<\/span><\/p><p><strong><span style=\"color: #000000;\">Key Strengths:<\/span><\/strong><\/p><ul><li><span style=\"color: #000000;\">Full offensive suite for emulating adversary TTPs<\/span><\/li><li><span style=\"color: #000000;\">Realistic, goal-driven simulation of attacks across multiple vectors<\/span><\/li><li><span style=\"color: #000000;\">Continuous testing of defensive controls and detection rules<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5c97e4 elementor-widget elementor-widget-image\" data-id=\"b5c97e4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/from-whatsapp-links-to-fake-apps-inside-indias-rising-app-scam-menace\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"595\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/10\/kali-linux-1024x595.jpg\" class=\"attachment-large size-large wp-image-26597\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/10\/kali-linux-1024x595.jpg 1024w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/10\/kali-linux-300x174.jpg 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/10\/kali-linux-768x446.jpg 768w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/10\/kali-linux-24x14.jpg 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/10\/kali-linux-36x21.jpg 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/10\/kali-linux-48x28.jpg 48w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/10\/kali-linux.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b6ee00 e-flex e-con-boxed e-con e-parent\" data-id=\"9b6ee00\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f23dde0 elementor-widget elementor-widget-text-editor\" data-id=\"f23dde0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\"><b>Continuous Third-Party Posture Intelligence, Enabled By RiskRecon<\/b><\/span><\/p><p><span style=\"font-weight: 400; color: #000000;\">RiskRecon extends visibility beyond your walls by continuously evaluating the security posture of your vendors and partners &#8211; securing your supply-chain ecosystem in the process.<\/span><\/p><p><span style=\"color: #000000;\"><strong>Key Strengths:<\/strong><\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; color: #000000;\">Continuous, automated evaluation of third-party and supplier security<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; color: #000000;\">Actionable intelligence on ecosystem-wide vulnerabilities<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; color: #000000;\">Integrated context for red team simulations involving partner or vendor vectors<\/span><\/li><\/ul><div><span style=\"color: #000000;\">Know your organization\u2019s cybersecurity risk today. Claim your Free\u00a0Security Rating Report by RiskRecon today!<\/span><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1215c5 elementor-widget elementor-widget-button\" data-id=\"f1215c5\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Free Security Rating Report<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd7caf6 elementor-widget elementor-widget-image\" data-id=\"dd7caf6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-in\/oems\/demo\/know-your-organizations-cybersecurity-risk-today-focus-on-the-risks-that-matter\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"350\" height=\"178\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/06\/Powered-by-riskrecon.webp\" class=\"attachment-large size-large wp-image-18980\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/06\/Powered-by-riskrecon.webp 350w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/06\/Powered-by-riskrecon-300x153.webp 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/06\/Powered-by-riskrecon-24x12.webp 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/06\/Powered-by-riskrecon-36x18.webp 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/06\/Powered-by-riskrecon-48x24.webp 48w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe3a19e e-flex e-con-boxed e-con e-parent\" data-id=\"fe3a19e\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27a0cf8 elementor-widget elementor-widget-heading\" data-id=\"27a0cf8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A Stack That Finds Every Last Vulnerability Across Your Ecosystem<span style=\"font-size: 2.5rem; font-style: inherit;\"><\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7beea5 e-flex e-con-boxed e-con e-parent\" data-id=\"f7beea5\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00f8eef elementor-widget elementor-widget-text-editor\" data-id=\"00f8eef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">iValue\u2019s Red Teaming Stack has all the shared capabilities needed to tackle the most pressing vulnerabilities and exposures seen in today\u2019s modern attack surface:<\/span><\/p><div><div dir=\"ltr\" style=\"margin-left: 0pt;\" align=\"left\"><table style=\"border-collapse: collapse; table-layout: fixed; width: 468pt; border: initial none initial;\"><colgroup><col width=\"110\" \/><col width=\"202\" \/><col \/><col \/><\/colgroup><tbody><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Vulnerability Type<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">How Our Stack Discovers &amp; Remediates Them<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">What Gets Fixed<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Positive Business Impact<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Shadow IT &amp; Orphaned Assets<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><ul><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">discovers unknown domains, subdomains and forgotten cloud instances<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kali <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">verifies exploitability<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">then conducts automated remediation\u00a0<\/span><\/li><\/ul><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Unknown assets are identified, risk-scored and decommissioned or onboarded into patch management and monitoring systems.<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Reduces unexpected attack surface + lowers audit &amp; compliance risk<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Misconfigured Cloud Storage (Public Buckets, Blobs)<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><ul><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">flags exposures<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kali <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">runs controlled proof-of-exploit checks<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Remediation playbooks are then pushed to ops teams<\/span><\/li><\/ul><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Misconfigurations are made private or access-scoped, and policies are updated to prevent recurrence.<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Prevents data leakage + protects customer data + reduces regulatory &amp; reputational risk<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Exposed &amp; Insecure APIs<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><ul><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">maps public APIs and endpoints<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kali <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">exercises authentication bypass &amp; fuzzing<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">RiskRecon <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">checks partner APIs for cross-tenant exposure\u00a0<\/span><\/li><\/ul><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Vulnerable endpoints are patched, authentication is tightened and API gateway rules are enforced.\u00a0<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Protects revenue-facing services + reduces attack vectors for automated abuse\/fraud<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Leaked Credentials &amp; Weak Authentication<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><ul><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">detects credential exposure signals<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kali <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">validates instances of credential-stuffing and privilege escalation<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">RiskRecon <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">flags partner credential hygiene<\/span><\/li><\/ul><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Compromised credentials are rotated, strong MFA is enforced and risky accounts are remediated.<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Drastically lowers probability of account takeover + reduces downstream lateral access risk<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Unpatched Known Vulnerabilities (Public CVEs)<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><ul><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">prioritizes externally reachable vulnerable assets<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kali <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">proves exploit chains<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Unified interface triggers prioritized patch windows<\/span><\/li><\/ul><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">High-risk CVEs are patched in prioritized order, with compensating controls applied if needed.<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Reduces likelihood of automated mass-exploit compromise + supports compliance with SLAs<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Third-Party &amp; Supply-Chain Exposures<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><ul><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">RiskRecon <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">continuously rates vendors<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">correlates vendor-exposed assets with your footprint<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kali <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">simulates vendor-to-customer pivot attempts<\/span><\/li><\/ul><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Weak vendor hygiene is remediated or segmented, with risky suppliers elevated into remediation programs.<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Protects against vendor-origin breaches + reduces supply-chain attack surface<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Lateral Movement &amp; Privilege Chain Gaps<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><ul><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kali <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">emulates escalating and pivoting<\/span><\/li><li dir=\"ltr\" style=\"line-height: 1.2;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable <\/span><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">maps affected hosts\/services and detects missing segmentation<\/span><\/li><\/ul><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Overly-permissive accounts and network segmentation gaps are closed, with detection rules added.<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Minimizes blast radius of breaches + stabilizes incident response\u00a0<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b10a51d e-flex e-con-boxed e-con e-parent\" data-id=\"b10a51d\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba97a6a elementor-widget elementor-widget-heading\" data-id=\"ba97a6a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Stronger Security, Tangible ROI with iValue\u2019s Red Teaming Stack<span style=\"font-size: 2.5rem; font-style: inherit;\"><\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15f03eb e-flex e-con-boxed e-con e-parent\" data-id=\"15f03eb\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eadfbc1 elementor-widget elementor-widget-text-editor\" data-id=\"eadfbc1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">Every enterprise faces the same decision when allocating security budgets: which programs truly deliver measurable value? That\u2019s where iValue\u2019s Red Teaming Stack stands apart among other adversarial simulation programs.<\/span><\/p><p><span style=\"color: #000000;\">Red Teaming functions as an ongoing evaluation framework, measuring how effectively your defenses perform under real-world pressure. It strengthens your organization\u2019s security posture and delivers measurable ROI by helping you drastically improve these KPIs:<\/span><\/p><ul><li><span style=\"color: #000000;\"><strong>Reduced Attacker Dwell Time:<\/strong> According to the <a href=\"https:\/\/services.google.com\/fh\/files\/misc\/m-trends-2024.pdf\" target=\"_blank\" rel=\"noopener\">Mandiant M-Trends 2024 report<\/a>, continuous red team exercises have helped mature organizations cut attack dwell times by 30-40% compared to peers relying on traditional testing.<\/span><\/li><li><span style=\"color: #000000;\"><strong>Reduced Breach Identification Time:<\/strong> As per a 2024 market report by <a href=\"https:\/\/pmarketresearch.com\/it\/red-teaming-service-market\/\" target=\"_blank\" rel=\"noopener\">PW Consulting<\/a>, organizations with continuous red team attack surface monitoring reduced their median breach identification time from around 287 days to 14 days.<\/span><\/li><li><span style=\"color: #000000;\"><strong>Reduction in Critical Vulnerabilities:<\/strong> Continuous red teaming initiatives can reduce exploitable, high-risk vulnerabilities by<a href=\"https:\/\/www.infopercept.com\/press-release\/indian-enterprises-cybersecurity-visibility-survey-2025\" target=\"_blank\" rel=\"noopener\"> 30-40% year-over-year<\/a>, leading to a drastically smaller attack surface<\/span><\/li><li><span style=\"color: #000000;\">Reduced Average Cost Per Breach: All these efforts from red teaming lead to shortened detection\/containment cycles. According to the 2024 <a href=\"https:\/\/in.newsroom.ibm.com\/2024-07-31-IBM-Report-Escalating-Data-Breach-Disruption-Pushes-Average-Cost-of-a-Data-Breach-in-India-to-All-Time-High-of-INR-195-Million-in-2024\" target=\"_blank\" rel=\"noopener\">IBM Cost Of A Data Breach Report<\/a>, organizations that contain breaches within 200 days save an average of $1.39 million compared to those taking longer.<\/span><\/li><\/ul><p><span style=\"color: #000000;\">However, these benefits are only theoretical if you don\u2019t set up the right red teaming processes &#8211; that\u2019s where iValue\u2019s Red Teaming Stack comes in. In a world where the digital landscape for enterprises is changing by the day.<\/span><\/p><p><span style=\"color: #000000;\">Speak to\u00a0<\/span><span style=\"color: #000000;\">a senior iValue Red Team member about improving your enterprise\u2019s security posture today.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e32950d e-flex e-con-boxed e-con e-parent\" data-id=\"e32950d\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e90d4c3 Read Teaming Blog Form elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"e90d4c3\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor-pro - v3.20.0 - 26-03-2024 *\/\n.elementor-button.elementor-hidden,.elementor-hidden{display:none}.e-form__step{width:100%}.e-form__step:not(.elementor-hidden){display:flex;flex-wrap:wrap}.e-form__buttons{flex-wrap:wrap}.e-form__buttons,.e-form__buttons__wrapper{display:flex}.e-form__indicators{display:flex;justify-content:space-between;align-items:center;flex-wrap:nowrap;font-size:13px;margin-bottom:var(--e-form-steps-indicators-spacing)}.e-form__indicators__indicator{display:flex;flex-direction:column;align-items:center;justify-content:center;flex-basis:0;padding:0 var(--e-form-steps-divider-gap)}.e-form__indicators__indicator__progress{width:100%;position:relative;background-color:var(--e-form-steps-indicator-progress-background-color);border-radius:var(--e-form-steps-indicator-progress-border-radius);overflow:hidden}.e-form__indicators__indicator__progress__meter{width:var(--e-form-steps-indicator-progress-meter-width,0);height:var(--e-form-steps-indicator-progress-height);line-height:var(--e-form-steps-indicator-progress-height);padding-right:15px;border-radius:var(--e-form-steps-indicator-progress-border-radius);background-color:var(--e-form-steps-indicator-progress-color);color:var(--e-form-steps-indicator-progress-meter-color);text-align:right;transition:width .1s linear}.e-form__indicators__indicator:first-child{padding-left:0}.e-form__indicators__indicator:last-child{padding-right:0}.e-form__indicators__indicator--state-inactive{color:var(--e-form-steps-indicator-inactive-primary-color,#c2cbd2)}.e-form__indicators__indicator--state-inactive [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-inactive-secondary-color,#fff)}.e-form__indicators__indicator--state-inactive object,.e-form__indicators__indicator--state-inactive svg{fill:var(--e-form-steps-indicator-inactive-primary-color,#c2cbd2)}.e-form__indicators__indicator--state-active{color:var(--e-form-steps-indicator-active-primary-color,#39b54a);border-color:var(--e-form-steps-indicator-active-secondary-color,#fff)}.e-form__indicators__indicator--state-active [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-active-secondary-color,#fff)}.e-form__indicators__indicator--state-active object,.e-form__indicators__indicator--state-active svg{fill:var(--e-form-steps-indicator-active-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed{color:var(--e-form-steps-indicator-completed-secondary-color,#fff)}.e-form__indicators__indicator--state-completed [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-completed-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed .e-form__indicators__indicator__label{color:var(--e-form-steps-indicator-completed-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed .e-form__indicators__indicator--shape-none{color:var(--e-form-steps-indicator-completed-primary-color,#39b54a);background-color:initial}.e-form__indicators__indicator--state-completed object,.e-form__indicators__indicator--state-completed svg{fill:var(--e-form-steps-indicator-completed-secondary-color,#fff)}.e-form__indicators__indicator__icon{width:var(--e-form-steps-indicator-padding,30px);height:var(--e-form-steps-indicator-padding,30px);font-size:var(--e-form-steps-indicator-icon-size);border-width:1px;border-style:solid;display:flex;justify-content:center;align-items:center;overflow:hidden;margin-bottom:10px}.e-form__indicators__indicator__icon img,.e-form__indicators__indicator__icon object,.e-form__indicators__indicator__icon svg{width:var(--e-form-steps-indicator-icon-size);height:auto}.e-form__indicators__indicator__icon .e-font-icon-svg{height:1em}.e-form__indicators__indicator__number{width:var(--e-form-steps-indicator-padding,30px);height:var(--e-form-steps-indicator-padding,30px);border-width:1px;border-style:solid;display:flex;justify-content:center;align-items:center;margin-bottom:10px}.e-form__indicators__indicator--shape-circle{border-radius:50%}.e-form__indicators__indicator--shape-square{border-radius:0}.e-form__indicators__indicator--shape-rounded{border-radius:5px}.e-form__indicators__indicator--shape-none{border:0}.e-form__indicators__indicator__label{text-align:center}.e-form__indicators__indicator__separator{width:100%;height:var(--e-form-steps-divider-width);background-color:#babfc5}.e-form__indicators--type-icon,.e-form__indicators--type-icon_text,.e-form__indicators--type-number,.e-form__indicators--type-number_text{align-items:flex-start}.e-form__indicators--type-icon .e-form__indicators__indicator__separator,.e-form__indicators--type-icon_text .e-form__indicators__indicator__separator,.e-form__indicators--type-number .e-form__indicators__indicator__separator,.e-form__indicators--type-number_text .e-form__indicators__indicator__separator{margin-top:calc(var(--e-form-steps-indicator-padding, 30px) \/ 2 - var(--e-form-steps-divider-width, 1px) \/ 2)}.elementor-field-type-hidden{display:none}.elementor-field-type-html{display:inline-block}.elementor-field-type-tel input{direction:inherit}.elementor-login .elementor-lost-password,.elementor-login .elementor-remember-me{font-size:.85em}.elementor-field-type-recaptcha_v3 .elementor-field-label{display:none}.elementor-field-type-recaptcha_v3 .grecaptcha-badge{z-index:1}.elementor-button .elementor-form-spinner{order:3}.elementor-form .elementor-button>span{display:flex;justify-content:center;align-items:center}.elementor-form .elementor-button .elementor-button-text{white-space:normal;flex-grow:0}.elementor-form .elementor-button svg{height:auto}.elementor-form .elementor-button .e-font-icon-svg{height:1em}.elementor-select-wrapper .select-caret-down-wrapper{position:absolute;top:50%;transform:translateY(-50%);inset-inline-end:10px;pointer-events:none;font-size:11px}.elementor-select-wrapper .select-caret-down-wrapper svg{display:unset;width:1em;aspect-ratio:unset;fill:currentColor}.elementor-select-wrapper .select-caret-down-wrapper i{font-size:19px;line-height:2}.elementor-select-wrapper.remove-before:before{content:\"\"!important}<\/style>\t\t<form class=\"elementor-form\" method=\"post\" name=\"Read Teaming Blog Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"26591\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"e90d4c3\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\" aria-required=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" placeholder=\"Message\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button type=\"submit\" class=\"elementor-button elementor-size-sm\">\n\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\" elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Send<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Moving From \u2018Inside-Out\u2019 To \u2018Outside-In\u2019 Cybersecurity Strategies \u2018Inside-out\u2019 security &#8211; relying on internal defenses, controls, policies, patching, and monitoring to protect against external threats &#8211; has long been the baseline for enterprise cybersecurity. Yet, this strategy is being rendered increasingly redundant in today\u2019s modern attack landscape, where Indian enterprises are facing: More Attacks:\u00a0In 2024, India &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/strategic-value-of-red-teaming-for-modern-enterprises\/\"> <span class=\"screen-reader-text\">Strategic Value of Red Teaming for Modern Enterprises<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":26593,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[182,332,186,428,624,191,422],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/26591"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=26591"}],"version-history":[{"count":10,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/26591\/revisions"}],"predecessor-version":[{"id":26603,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/26591\/revisions\/26603"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/26593"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=26591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=26591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=26591"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=26591"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=26591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}