Attack Simulations:
Red & Purple Teaming


Complex Attack Simulations, Battle-Tested Experts

Advanced Offensive Security Testing: 
Shine a Light On Vulnerabilities

What we know: 
Organizations splash lots of money on security controls.


What we don’t always know: 
How well are they working?


What we try not to think about: 
What if the answer is “not so well”?


How can we know for sure?


Good news. Advanced offensive security testing shines a bright light on exploitable vulnerabilities. Before a hacker finds them.


The Optiv Attack Simulation gauges actual resilience to cyberthreats (e.g., garden-variety cybercrooks, nation states, competitors, hacktivists, etc.), aligns security posture to defined business objectives and prepares your purple team to detect, prevent and respond to attacks.

How It Works

The attack sim emulates an advanced threat actor’s opportunistic, covert, goal-oriented attempts to compromise high-value targets. It reveals real-world threats spanning the entire attack surface – logical, physical and social – via social engineering, covert penetration testing, physical access control bypass and subversion.


We simulate the hacker via subterfuge and misdirection, identifying weaknesses, exploiting critical systems and “stealing” data by mimicking an actual breach.


Opportunistic, blended attack sequences employ social engineering, physical security, network security and application attacks, simulating the threats we see in the wild every day.


An attack simulation highlights a breach’s impact on an organization, the board and the executive team. The debrief depicts actual threat paths and their respective points of compromise – policies, procedures, hardware, etc.

The organization – your organization – walks away with clarity on efficiencies/deficiencies and armed with insight to inform further security spend and KPI development.



Get the Attack Sim Service Brief 


How Our Red & Purple Teams Do It

The not-so-secret sauce is collaboration. From kickoff to debrief, we work hand-in-glove with you to understand the challenges within your distinct business, technical and cultural context. We can do cool hacks, but the real value of working with us is what you learn and how it builds self-reliance after the engagement ends.



Attack Simulation Methodology

Threats and Intelligence@2x


Threat Intelligence


  • Planning and requirements
  • Collection
  • Analysis and production
  • Discussion and integration
Threat modeling@2x


Threat Modeling


  • Determine assets
  • Understand threat agents
  • Derive position/relevance
  • Build strategy
  • Operationalize
  • Monitor and adapt




Purple Team Breach


  • Information profiling
  • Discover (passive/active)
  • Solicitation
  • Exploitation/post exploitation
  • Covert/surreptitious
  • Attack chain analysis


Speak to an Expert