We have what you need

Today’s winning organizations need a combination of strategic insight, domain expertise, data and technology.

Best Solutions

Our mission is to support our costumers in choosing and implementing the best solutions and the best supplier for them.

Best Service

We want to become the portuguese reference in Data Networking, Information Security, and Information Management.

Our Solutions

WE ARE EXPERTS

Security
Audits

We execute detailed Security audits in network systems. During the audit process we take account not only of all the resources’ configurations and processes but also of the already implemented procedures. We analyse the vulnerabilities and risks related to each enumerated item.

Perimeter
Defense

Our perimeter defence solutions from Fortinet and Checkpoint allow the implementation and enforcing of Security Policies, assuring that every user and any traffic and information coming from or to the network is monitored and controlled, according to the requirements of each company or system.

Infrastructure
Design

We have specialized staff in communication data, voice and video infrastructure dimensioning and design.
We evaluate customers’ requirements and help them to choose the best solution, regardless of the manufacturer or supplier. We assure the success of the solution, by fully backing the entire process, controlling, monitoring and evaluating performance and requirements from day 1 to final project acceptance.

Forensics

Redshift Consulting represents the leading nationally and internationally recognized suppliers of forensic digital analysis technology for the domestic market as the leaders in the various areas of supply that address, based on international standards and best practices worldwide, the needs of entities Responsible for the security of citizens in the various aspects of cybercrime.

Network
Monitoring

Systems that continuously monitor the availability and performance of all network connected equipment. They test, collect statistics, generate alerts, monitor baseline utilization on any Server, Router, Switch, Firewall, Laptop, Printer, etc.

Vulnerabilities
Management

We implement Vulnerabilities Analysis and Management Systems with best of breed, world recognized, market leader’s solutions from TENABLE. These solutions allow our customers to detect and monitor any technical risk that might exist on their Networked equipment.

Network
Maintenance

We provide specially designed maintenance, support and repair solutions for data network equipment that can assure the replacement and the operational availability of almost any type of equipment from the leading manufacturers, regardless of how old the equipment is, even for out production or out support items. We design the solution based on the type of equipment, the service requirements and the requested SLA.

Security
Events

Our solutions allow not only a detailed and continuous analysis of every events that appear on any network resource, but also to analyse the information and correlating it with any other, generating information, analysis and alerts on any internal or external attack.

IT
Consultancy

Our teams are prepared for any type or level of consultancy. We execute audits, study, design and evaluate solutions, propose alternatives, control and certify system implementations, validate requirements and elaborate support and operational reports of any system or technology.

Security
Support

We provide specially designed maintenance, support and repair solutions for data network equipment that can assure the replacement and the operational availability of almost any type of equipment from the leading manufacturers, regardless of how old the equipment is, even for out production or out support items. We design the solution based on the type of equipment, the service requirements and the requested SLA.

Success Stories

BE ONE OF THEM

A financial entity wanted to reduce the effort and time of data collection as well as the automatic generation of reports. The challenge was also posed for critical environments to be monitored taking into account production environments, which can not be affected by the solution being implemented.

Our solution: Tenable Security Center Continuous View (SCCV)

The government needed to provide resources with the ability to collect and analyze security events in order to prevent and anticipate internal or external cyber threats.

Our solution: IBM QRadar SIEM (Security Information and Event Management)

In an industry it was necessary to perform an audit of the communications infrastructure, LAN and Security and Support Systems. It should, among other things, carry out the survey of the current infrastructure and validate and, of the existing inventory, confirm / validate the existing documentation.

Our solution: Auditing of networked systems, risk and vulnerability analysis, compliance analysis

A Financial Entity had the need to renew the Content Management and Workflows platform that supported its business with approximately 9,000 users. A comprehensive turnkey implementation with a maximum duration of 18 months was intended.

Our solution: RED.doc and RED.scan integrated with IBM / Filenet Technology

An insurance group had to renew the Content Management and Document Processing platform throughout its organization in the national market for a total of 2000 users. The implementation of the project had a maximum execution period of 7 months.

Our Solution: RED.doc and RED.scan

An International BPO Services Group has a presence in 20 countries with heterogeneous solutions in each region with high operating costs and difficulties in addressing reliably, complying with the required SLA's, large volume scanning and indexing projects.

Our Solution: RED.scan

Latest News

FEATURED INSIGHTS

Why Choose Us

FUN FACTS ABOUT US

45

Consultants

120

Satisfied Customers

200

Projects Safe

11

Cities in the World


Request Quote

Fill in the form and press “Send Us a Message”. Your details will be sent directly to us.