top of page





Defined: A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. The Red Team’s objective is to improve enterprise cybersecurity by demonstrating the impacts of successful attacks and by demonstrating what works for the defenders (i.e., the Blue Team) in an operational environment. Also known as Cyber Red Team.



The IP security (IPSec) is an Internet Engineering Task Force (IETF) standard suite of protocols between 2 communication points across the IP network that provide data authentication, integrity, and confidentiality. It also defines the encrypted, decrypted and authenticated packets. The protocols needed for secure key exchange and key management are defined in it.



A digital footprint is data that is left behind when users have been online. There are two types of digital footprints which are passive and active. A passive footprint is made when information is collected from the user without the person knowing this is happening.

Online Footprint Mitigation and Digital Privacy Tiered Services



Keith Evans, Deputy Director of Executive Services

Gavin Gumbinner

Director of Executive Services

Gladius understands that we live in a complex and changing environment dominated by technology in the 21st century. In order to best serve our executive clientele and provide a full-scope of solutions and capabilities, Gladius provides cyber and privacy security solutions through a vetted partnership organization. Matching Gladius’ core beliefs, our cyber team consists of special operations, intelligence, and corporate security professionals who have a proven track record of safeguarding life, assets, and intellectual property around the world.


  • Cyber Red Cell

  • Digital ID Protection

  • Online Footprint Mitigation

  • IP Security

  • Threat Monitoring

  • Location Hardening

  • Fraud Preventions

  • Digital Forensics


  • Over 400 sites scanned daily for client profiles and information. Accurate profiles are removed from available. databases and continuously monitored for repopulation.

  • Decoy data program.

  • Monthly reports sent to our clients illustrating the identifying information targeted and removed.

The foundation of Gladius’ digital footprint reduction program; making It more difficult to identify real home addresses, contact information, and to target with social engineering software.


  • Extensive Dark web coverage including leak sites, forums and criminal marketplaces.

  • Global threat intelligence analysts covering multiple languages and cultural understanding.

  • White glove threat mitigation when compromised credentials are discovered.

  • Doxing monitor and alerting.

  • Includes all 360 Delete services.

Data breach and Doxing awareness program completely managed and maintained by privacy experts and analysts with verified alerts and tailored risk mitigation recommendations.


  • 24/7 Cybersecurity support for any digital security and privacy need.

  • Dedicated Consultant to answer any concerns.

  • Secure configuration and phishing protection on all personal devices.

  • Custom tailored solutions to fit client needs.

  • Home security assessment and personalized client education.

  • Includes all 360 Delete and Monitor services.

Full cybersecurity concierge, with a household tailored cyber protection program and 24/7 access to digital security experts when the need arises.

bottom of page