{"id":179414,"date":"2018-03-05T16:38:56","date_gmt":"2018-03-05T21:38:56","guid":{"rendered":"https:\/\/www.cyberark.com\/services-support\/red-team-services\/"},"modified":"2025-02-07T17:16:49","modified_gmt":"2025-02-07T22:16:49","slug":"red-team-services","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/","title":{"rendered":"Red Team Services"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero slate&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1>Red Team Services<\/h1>\n<h2>See if your security solutions are ready for prime time. The CyberArk Red Team specializes in finding your solution\u2019s flaws\u2014before attackers do.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Contact Sales&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcontact%2F&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/product-datasheets\/cyberark-red-team-datasheet\">Download Datasheet<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121812\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg\" alt=\"Red Team Adversary Simulation Services\" width=\"770\" height=\"530\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary-300x206.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary-768x529.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary-150x103.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Put your defenses to the test<\/h3>\n<p>Specializing in adversary simulations, the CyberArk Red Team thinks and acts like expert attackers. Watch them work to exploit your cloud and hybrid environments, DevOps pipelines, and processes\u2014so you\u2019re able to optimize your solutions.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-121820\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Strong-Authentication.svg\" alt=\"Test Security Controls icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Test<\/h4>\n<p>Setting your security controls properly is essential to any cybersecurity program\u2014and there\u2019s no better way to make sure you have them right then testing them out[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120993\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Reduction-in-Risk.svg\" alt=\"Assess Security Defense Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Assess<\/h4>\n<p>Putting your defenses to the test gives your security teams a baseline to measure progress\u2014and a smart way to uncover unknown weaknesses[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109195\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Defend-Against-Attacks-icon.svg\" alt=\"Improve Security Controls icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Improve<\/h4>\n<p>Watching an attacker\u2019s tactics, techniques and procedures (TTP\u2019s) in action helps detect areas of risk\u2014and opportunities optimize security controls[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2-pad cybv2 cybv2-background-oval tour&#8221;][vc_column][vc_row_inner el_class=&#8221;cyb-center&#8221;][vc_column_inner el_class=&#8221;cyb-pad-btm&#8221;][vc_column_text el_class=&#8221;left-mobile&#8221;]<\/p>\n<h3>Cyberattacks are inevitable. Damage is not.<\/h3>\n<p>With our services, training and research we can help your team prepare for Cyberattacks.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8221;square&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221;][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;White Hacking Services&#8221; tab_id=&#8221;white-hacking-services&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>White Hacking Services<\/h4>\n<p>We provide white hacking services that test your organization\u2019s abilities to detect and respond to advanced threats without introducing business risk. [\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121828\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-1.png\" alt=\"White Hacking Services\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;CyberArk Labs&#8221; tab_id=&#8221;labs&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>CyberArk Labs<\/h4>\n<p>Through innovative research, CyberArk Labs examines emerging attack techniques to drive greater awareness, industry collaboration and help companies improve their security posture. [\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/labs.cyberark.com\/\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121836\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-2.png\" alt=\"CyberArk Labs\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Defense Optimization&#8221; tab_id=&#8221;defense-optimization&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Defense Optimization<\/h4>\n<p>To help reduce risk and optimize security, once we have tested your defenses we provide a comprehensive report showcasing strengths and weaknesses with prioritized recommendations to rapidly reduce existing risks and mitigate vulnerabilities. [\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121844\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-3.png\" alt=\"Cyber Defense Optimization\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Training&#8221; tab_id=&#8221;training&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Training<\/h4>\n<p>Benefit from instructor led training and hands-on experience on attacker\u2019s Tools, Tactics and Procedures (TTP).[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/training.cyberark.com\/instructor-led-training\/cyberark-red-team-ttp\" target=\"_blank\" rel=\"noopener\">Red Team TTP Training<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121852\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-4.png\" alt=\"Cybersecurity Training\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-up&#8221; add_icon=&#8221;true&#8221; title=&#8221;Threat Research&#8221; tab_id=&#8221;threat-research&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Threat Research<\/h4>\n<p>Stay up to date with the leading threat research from our global team of cybersecurity experts.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/threat-research-blog\">Go Now<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121860\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-5.png\" alt=\"Threat Research\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-5.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-5-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-5-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Explore<br \/>\nrelated<br \/>\nresources<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/\">View All Resources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1628010403659{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cyberark-blueprint dark&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section3_h4&#8243;]<\/p>\n<h3>Contact Sales<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section3_text&#8221;]<\/p>\n<h4>We\u2019re focused on helping our clients achieve rapid and sustainable results.<\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_btn title=&#8221;Contact Us&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;right&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcontact%2F&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero slate&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Red Team Services See if your security solutions are ready for prime time. The CyberArk Red Team specializes in finding your solution\u2019s flaws\u2014before attackers do. [\/vc_column_text][vc_btn title=&#8221;Contact Sales&#8221;&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":179408,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-179414","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk Red Team Training Services for Security Operations Teams<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red Team Services\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero slate&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Red Team Services See if your security solutions are ready for prime time. The CyberArk Red Team specializes in finding your solution\u2019s flaws\u2014before attackers do. [\/vc_column_text][vc_btn title=&#8221;Contact Sales&#8221;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-07T22:16:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/\",\"url\":\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/\",\"name\":\"CyberArk Red Team Training Services for Security Operations Teams\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg\",\"datePublished\":\"2018-03-05T21:38:56+00:00\",\"dateModified\":\"2025-02-07T22:16:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services and Support\",\"item\":\"https:\/\/www.cyberark.com\/ko\/services-support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Red Team Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk Red Team Training Services for Security Operations Teams","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/","og_locale":"ko_KR","og_type":"article","og_title":"Red Team Services","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero slate&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Red Team Services See if your security solutions are ready for prime time. The CyberArk Red Team specializes in finding your solution\u2019s flaws\u2014before attackers do. [\/vc_column_text][vc_btn title=&#8221;Contact Sales&#8221;...","og_url":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-02-07T22:16:49+00:00","og_image":[{"width":770,"height":530,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/","url":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/","name":"CyberArk Red Team Training Services for Security Operations Teams","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg","datePublished":"2018-03-05T21:38:56+00:00","dateModified":"2025-02-07T22:16:49+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Red-Team-Adversary.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Services and Support","item":"https:\/\/www.cyberark.com\/ko\/services-support\/"},{"@type":"ListItem","position":3,"name":"Red Team Services"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/comments?post=179414"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179414\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179408"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media?parent=179414"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/product_category?post=179414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}