
We have what you need
Today’s winning organizations need a combination of strategic insight, domain expertise, data and technology.

Best Solutions
Our mission is to support our costumers in choosing and implementing the best solutions and the best supplier for them.

Best Service
We want to become the portuguese reference in Data Networking, Information Security, and Information Management.
Our Solutions
WE ARE EXPERTS
Security
Audits
We execute detailed Security audits in network systems. During the audit process we take account not only of all the resources’ configurations and processes but also of the already implemented procedures. We analyse the vulnerabilities and risks related to each enumerated item.
Perimeter
Defense
Our perimeter defence solutions from Fortinet and Checkpoint allow the implementation and enforcing of Security Policies, assuring that every user and any traffic and information coming from or to the network is monitored and controlled, according to the requirements of each company or system.
Infrastructure
Design
We have specialized staff in communication data, voice and video infrastructure dimensioning and design.
We evaluate customers’ requirements and help them to choose the best solution, regardless of the manufacturer or supplier. We assure the success of the solution, by fully backing the entire process, controlling, monitoring and evaluating performance and requirements from day 1 to final project acceptance.
Forensics
Redshift Consulting represents the leading nationally and internationally recognized suppliers of forensic digital analysis technology for the domestic market as the leaders in the various areas of supply that address, based on international standards and best practices worldwide, the needs of entities Responsible for the security of citizens in the various aspects of cybercrime.
Network
Monitoring
Systems that continuously monitor the availability and performance of all network connected equipment. They test, collect statistics, generate alerts, monitor baseline utilization on any Server, Router, Switch, Firewall, Laptop, Printer, etc.
Vulnerabilities
Management
We implement Vulnerabilities Analysis and Management Systems with best of breed, world recognized, market leader’s solutions from TENABLE. These solutions allow our customers to detect and monitor any technical risk that might exist on their Networked equipment.
Network
Maintenance
We provide specially designed maintenance, support and repair solutions for data network equipment that can assure the replacement and the operational availability of almost any type of equipment from the leading manufacturers, regardless of how old the equipment is, even for out production or out support items. We design the solution based on the type of equipment, the service requirements and the requested SLA.
Security
Events
Our solutions allow not only a detailed and continuous analysis of every events that appear on any network resource, but also to analyse the information and correlating it with any other, generating information, analysis and alerts on any internal or external attack.
IT
Consultancy
Our teams are prepared for any type or level of consultancy. We execute audits, study, design and evaluate solutions, propose alternatives, control and certify system implementations, validate requirements and elaborate support and operational reports of any system or technology.
Security
Support
We provide specially designed maintenance, support and repair solutions for data network equipment that can assure the replacement and the operational availability of almost any type of equipment from the leading manufacturers, regardless of how old the equipment is, even for out production or out support items. We design the solution based on the type of equipment, the service requirements and the requested SLA.
Success Stories
BE ONE OF THEM
A financial entity wanted to reduce the effort and time of data collection as well as the automatic generation of reports. The challenge was also posed for critical environments to be monitored taking into account production environments, which can not be affected by the solution being implemented.
Our solution: Tenable Security Center Continuous View (SCCV)
In an industry it was necessary to perform an audit of the communications infrastructure, LAN and Security and Support Systems. It should, among other things, carry out the survey of the current infrastructure and validate and, of the existing inventory, confirm / validate the existing documentation.
Our solution: Auditing of networked systems, risk and vulnerability analysis, compliance analysis
A Financial Entity had the need to renew the Content Management and Workflows platform that supported its business with approximately 9,000 users. A comprehensive turnkey implementation with a maximum duration of 18 months was intended.
Our solution: RED.doc and RED.scan integrated with IBM / Filenet Technology
Latest News
FEATURED INSIGHTS
Why Choose Us
FUN FACTS ABOUT US
Request Quote
Fill in the form and press “Send Us a Message”. Your details will be sent directly to us.