solutions & services

SECURITY AUDITS

We execute detailed Security audits in networked systems. During the audit process we take account of all resources and their configuration and processes and procedures implemented. We analyse the vulnerabilities and the risk related to each enumerated item.

NETWORK MONITORING

Systems that continuously monitor the availability and performance of all network connected equipment. They test, collect statistics, generate alerts, monitor baseline utilization on any Server, Router, Switch, Firewall, Laptop, Printer, etc.

SECURITY EVENTS

Our solutions allow a detailed and continuous analysis of all events that appear on any network resource, and also to analyse the information and correlate it with any other, generating information, analysis and alerts on any internal or external attack.

PERIMETER DEFENSE

Our perimeter defence solutions from Fortinet and Checkpoint allow the implementation and enforcing of Security Policies, assuring than every user and any traffic and information coming from or to the network is monitored and controlled, according to the requirements of each company or system.

VULNERABILITIES MANAGEMENT

We implement Vulnerabilities Analysis and Management Systems with best of breed, world recognized, market leader’s solutions from TENABLE (www.tenable.com). These solutions allow our customers to detect and monitor any technical risk that might exist on their Networked equipment. 

IT CONSULTANCY

Our teams are prepared for any type or level of consultancy.  We execute audits, study, design and evaluate solutions, propose alternatives, control and certify system implementations, validate requirements and elaborate support and operational reports of any system or technology.

INFRAESTRUTURE DESIGN

We have specialized staff in communication data, voice and video infrastructure dimensioning and design.
We evaluate customers’ requirements and help them choose the best solution, regardless of the manufacturer or supplier. We assure the success of the solution, by fully backing the entire process, controlling, monitoring and evaluating performance and requirements from day 1 to final project acceptance.

NETWORK MAINTENANCE

We provide specially designed maintenance, support and repair solutions for data network equipment, that can assure the replacement and the operational availability of almost any type of equipment from the leading manufacturers, regardless of how old the equipment is, even for out production or out support items. We design the solution based on the type of equipment, the service requirements and the requested SLA. 

SUPPORT

We offer specialized and professional staff to support, onsite or off-site, in first and/or second level, of any data and/or voice enterprise network, regardless of the size and requirements.
We provide and assure the correct and expected service level of availability and operation of the infrastructure, in an even more effective manner if this service is combined with our Network Maintenance offer.

FORENSICS

Redshift Consulting represents the leading nationally and internationally recognized suppliers of forensic digital analysis technology for the domestic market as the leaders in the various areas of supply that address, based on international standards and best practices worldwide, the needs of entities Responsible for the security of citizens in the various aspects of cybercrime.

partners

Vulnerability scanning, detection and Management Systems (Nessus Network Scanner, Security Center)
www.tenable.com
Security Information and Event Management (QRADAR)
www.ibm.com
Web applications vulnerability scanning and analysis solutions (Web Vulnerability Scanner)
www.acunetix.com
Data Network Perimeter Security (Fortigate)
www.fortinet.com
End-point protection systems (Antivirus)
www.kaspersky.com
Data Network and IP Telephony Systems
www.cisco.com
Data Network Perimeter Security (Firewall-1)
www.checkpoint.com
Network ans Systems monitoring solution
www.paessler.com 
Servers, storageand backup
www.hp.com
Real-time threat protection against the next generation of cyber attack
www.fireeye.com

success stories

clients

contacts

LISBON
Centro Emp. Torres de Lisboa
Rua Tomás da Fonseca, Torre G 1º Piso
1600-209 Lisboa
Portugal
Phone :+351 217 230 635 
Fax : +351 217 230 675
Email: geral@redshift.pt

Pólo Tecnológico de Lisboa
Rua António Champalimaud, Lote 1, sala 1.0.5
1600-546 Lisboa 
Portugal
Phone: +351 217 101 622 
Email: geral@redshift.pt
ANGOLA
Condominio das 30 Casas, Casa 16
Talatona - Luanda
Angola
Phone: +244 941 439 020
Email: geral@redshift.pt
ALMADA
Rua Cmdt. Antonio Feio, 13, 2º Dto
Cacilhas
2800-256 Almada
Portugal
Phone :+351 308 801 040
Fax : +351 308 801 041
Email: geral@redshift.pt