About Us
Blue Bastion, a division of Ideal Integrations, is a managed security services provider specializing in defensive and offensive cybersecurity operations. Both the offensive and defensive teams at Blue Bastion consistently work together to help each other’s skillset. With access to our Security Operations Center’s toolset, including but not limited to Carbon Black and CrowdStrike, the Offensive Security team members test their skills and toolset against tools and techniques deployed by advanced blue teams. The defensive teams utilize their access to the red team to better train their tools and learn new techniques used by offensive operators.
Partnerships First
Blue Bastion’s Offensive Security Services team includes highly technical and experienced consultants whose goal is to make their own job (as hackers) more difficult.
We’ll work with you to figure out what you actually need- then provide the expertise needed to make it happen. We aim to be your partner, not your critic; your growth is our top priority.
Total Transparency
We’ll show you how and why we do what we do, and be part of the assessment from start to finish.
Blue Bastion’s penetration testing reports consider the effective risk and real-world impact to provide the client with a true picture of current security landscape. We make a significant effort to only provide validated and exploited findings in our reports. The findings are preceded by a discussion on any positive measures, including compensating controls, identified in the client’s environment.
Proven Expertise
We come from a diverse range of disciplines and have worked with organizations big and small. Outside of work, you’ll often see our team members at conferences and events whether it’s as speakers, teachers, or attendees.
Both the offensive and defensive teams at Blue Bastion consistently work together to help each other’s skillset.
Giving back to Community
Blue Bastion gives back to the community by donating time, financial resources, and skillsets. This includes the following:
We provide financial sponsorships to Open-Source developers to help drive innovation in both offensive and defensive security realms.
Our Offensive Security team members have presented at numerous security conferences including but not limited to Blackhat US and EU, DEFCON, and many smaller BSides conferences.
Our team members are lifelong learners. We have taught classes on topics related to offensive security at Blackhat, BSides, and in college classrooms.
Programmatic Approach
Tailored cybersecurity solutions built for you and your mission.
Regardless of where your cybersecurity program is at, we’ll work with you to understand your business and what makes it tick. We’ll integrate into your cybersecurity program as trusted advisors, working with you to provide the solutions and expertise you need, exactly when you need it.
Instead of doing everything at once, we’ll help you prioritize and address your cybersecurity challenges in a way that provides the most impact as soon as possible.
Leadership
Certifications
Certified Information Systems Security Professional (CISSP)
Offensive Security Certified Professional (OSCP)
Certified Red Team Operator (CRTO)
CompTIA Security+
Certified Ethical Hacker (CEH)
Covert Methods of Entry by Red Team Alliance
NSA Information Assessment Methodologies (NSA-IAM)
NSA Information Evaluation Methodologies (NSA-IEM)
Certified Red Team Professional (CRTP)
GIAC Certified Reverse Engineer: Malware (GREM)
Our Partners
Awards
Conferences
We have been involved in cybersecurity community and conferences for decades. This includes volunteering, presenting cutting edge research, and teaching workshops on the topics related to offensive and defensive sides of the field.