RDMA Consultoria
Cybersecurity. Technology. Management.

Defend your business before the attack happens.

RDMA delivers information security, infrastructure, compliance and management for companies that can't go down.

system online edge SAO1 threat lvl 18/100 mttr < 1h 12:23:11 BRT · t0
Standards we cover
9001 • 14001 • 27001 • 22301
Incident response
24/7
Target MTTR
< 1h
RDMA Consultoria
rdma-soc :: /var/log/reconLIVE
CVECVE-2025-12345CVSS 9.8Apache Struts RCE
CVECVE-2025-23198CVSS 9.1Cisco IOS XE auth bypass
CVECVE-2025-30412CVSS 8.8Microsoft Exchange SSRF
CVECVE-2025-44102CVSS 9.6Fortinet FortiOS RCE
CVECVE-2025-50831CVSS 8.2OpenSSH pre-auth disclosure
CVECVE-2025-60014CVSS 9.0VMware vCenter RCE
CVECVE-2025-66291CVSS 7.5WordPress arbitrary upload
CVECVE-2025-70988CVSS 9.3GitLab pipeline injection
CVECVE-2025-78124CVSS 8.6Citrix NetScaler memory leak
CVECVE-2025-12345CVSS 9.8Apache Struts RCE
CVECVE-2025-23198CVSS 9.1Cisco IOS XE auth bypass
CVECVE-2025-30412CVSS 8.8Microsoft Exchange SSRF
CVECVE-2025-44102CVSS 9.6Fortinet FortiOS RCE
CVECVE-2025-50831CVSS 8.2OpenSSH pre-auth disclosure
CVECVE-2025-60014CVSS 9.0VMware vCenter RCE
CVECVE-2025-66291CVSS 7.5WordPress arbitrary upload
CVECVE-2025-70988CVSS 9.3GitLab pipeline injection
CVECVE-2025-78124CVSS 8.6Citrix NetScaler memory leak
About us

A consultancy built for companies that treat data as a critical asset.

RDMA operates at the intersection of information security, IT infrastructure and management. We bring together lead auditors, ethical hackers, network architects and Microsoft specialists under one mission: reduce risk and expand capacity.

Our method combines technical assessment, regulatory compliance and continuous operations. From initial discovery to incident response, plus training and security culture at every level of the organization.

Offensive and defensive security

Pentesting, red team, SOC, hardening and incident response driven by threat intelligence.

Applied compliance

Hands-on implementation of ISO 9001, 14001, 27001 and 22301, LGPD/GDPR and NIST/CIS frameworks.

Operations and support

Network engineering, Microsoft licensing, automations and 24/7 sustainment.

Operação contínua

Visibilidade total. Resposta imediata.

22/ 100
risk score
94/ 100
cobertura
78/ 100
patch level
ataques bloqueados / 24h
12.847
WAF + EDR + DNS
tráfego suspeito (req/s)
61
últimos 12 buckets
endpoints monitorados
4 218
Defender / EDR
políticas Zero Trust
aplicadas
conditional access ativo
rdma · soc · v4.2amostra ilustrativa de operação realbuild 8a3f · gru1
Services

Everything your operation needs from one technical partner.

From perimeter to application layer, server to end user, contract to administrative process, we have it covered.

CORE

Cybersecurity

Defense in depth against ransomware, phishing, zero-day exploitation and insider threats. Monitoring, hardening, vulnerability management and custom SIEM/SOC.

SOCSIEMEDRMFAZero Trust
OFFENSIVE

Pentesting and Ethical Hacking

Black, grey and white box penetration testing on web, mobile, APIs, internal networks and cloud environments. Reports aligned with OWASP, PTES and MITRE ATT&CK.

OWASPPTESRed TeamCloud Sec
INFRA

Network Engineering

Design and deployment of enterprise networks with segmentation, next-gen firewalls, VPN, SD-WAN, enterprise Wi-Fi and IP telephony. Architecture built to scale.

NGFWSD-WANVPNWi-Fi 6
COMPLIANCE

Compliance and Audit

Gap assessment, implementation and internal audit for ISO 9001, 14001, 27001 and 22301. Certified lead auditors drive the process end to end.

ISO 27001ISO 9001LGPD/GDPRNIST CSF
PARTNER

Microsoft and Licensing

Sales, activation and support for Microsoft 365, Azure, Windows Server and Power Platform. License optimization, tenant migration and identity governance.

M365AzureEntra IDIntune
NEW

Artificial Intelligence

Consulting on generative AI adoption, agent automations, enterprise RAG, internal copilots and safe-use policies for employees.

LLMsRAGAgentsAI Governance
INSIGHT

Analytics and Data

Data engineering, executive BI, Power BI dashboards, dimensional modeling and a data-driven culture. Decisions based on evidence, not guesswork.

Power BIETLDWKPIs
OPS

Administrative Management

Support for administration with processes, internal controls, KPIs, governance and operational structuring for growing or restructuring companies.

BPMSLAGovernancePMO
The cost of ignoring security

Companies that don't treat vulnerabilities as a priority pay dearly.

The numbers below reflect consolidated global and regional trends from market research. The question isn't if an attack will come, it's when.

0.00M USD

Global average cost of a data breach in 2024

0 days

Average time to identify and contain an incident

0%+

Attacks that start with social engineering or phishing

0%

Of attacked SMBs shut down within 6 months

Vulnerabilities that compromise operations the most

  • Ransomware and double extortion
  • Phishing and social engineering
  • Leaked and reused credentials
  • Unhardened servers and endpoints
  • Outdated software with known CVEs
  • Cloud misconfigurations
  • Exposed APIs without authentication
  • No immutable backups
  • No MFA
  • Excessive privileges, no least privilege
  • Shadow IT and shadow AI
  • Insider threat from malicious or negligent users

What's at stake

  • Operational shutdown and lost revenue from downtime
  • Data protection fines (LGPD/GDPR), millions in exposure
  • Leakage of intellectual property and customer data
  • Reputational damage and loss of market trust
  • Civil and criminal liability for executives

Signals we monitor right now

monitoring
  • 12:23:11highAS16509WAF rule triggered (SQLi)
  • 12:23:11infoAS14618Sign-in from new country
  • 12:23:11highAS8068Outdated package CVE-hit
  • 12:23:11highAS396982Web credential stuffing
  • 12:23:11medAS14618Anomalous outbound traffic
  • 12:23:11highAS396982Outdated package CVE-hit

Illustrative sample of events correlated to real operations.

Compliance and audit

International standards, implemented by people who actually do the work.

We deliver with certified lead auditors on the main ISO standards. Gap analysis, adequacy plan, implementation, training and internal audit.

ISO 9001
● certifiable

Quality Management

Standardizes processes, improves delivery predictability and strengthens client and supplier relationships.

ISO 14001
● certifiable

Environmental Management

Establishes controls to reduce environmental impact and meet legal and contractual requirements that are increasingly demanded.

ISO 27001
● certifiable

Information Security

Information security management system (ISMS) that protects data confidentiality, integrity and availability.

ISO 22301
● certifiable

Business Continuity

Ensures your business keeps operating, or recovers fast, when incidents, disasters and crises happen.

LGPD/GDPR and complementary frameworks

We bring your company into compliance with data protection laws and market frameworks: NIST CSF, CIS Controls, COBIT, ITIL and MITRE ATT&CK.

Success stories

Real results with real clients, disclosed under NDA.

The cases below reflect deliveries executed by the RDMA team. Identities preserved at client request.

Manufacturingcase #01
Desafio

Ransomware attack with factory floor shutdown and crypto ransom demand.

Solução

Incident response, containment, immutable backup restoration, hardening, OT/IT segmentation and 24/7 EDR/SOC deployment.

Resultado

Operations restored in 36 hours, zero ransom paid, 92% reduction in attack surface.

Healthcare. Clinic networkcase #02
Desafio

Need to comply with LGPD and ISO 27001 under partner insurer audit.

Solução

Gap analysis, classification policy, access control, encryption at rest, outsourced DPO and corporate training.

Resultado

ISO 27001 certification achieved in 9 months, 100% adherence to insurer requirements.

Retail. E-commercecase #03
Desafio

Traffic spikes, dropping conversion and no visibility into fraud and bots.

Solução

Cloud network redesign, WAF, CDN, anti-bot, executive Power BI dashboards and Microsoft licensing governance.

Resultado

58% latency reduction, 41% drop in chargeback fraud and 22% license cost savings.

Financial services. Fintechcase #04
Desafio

New product launch required deep pentest and cloud architecture review before regulatory go-live.

Solução

Black-box and grey-box pentest on API and app, IaC review, threat modeling and Zero Trust identity rollout.

Resultado

23 critical vulnerabilities mitigated before go-live, regulatory approval with no remarks.

Capability building

Training that turns ordinary teams into prepared teams.

Hands-on content, instructors with field experience, materials aligned to your operation. In-company, remote or hybrid.

BÁSICO

Security Awareness

Security culture for every employee: passwords, phishing, personal devices, social engineering and responsible use.

INTERMEDIÁRIO

Data Protection in Practice (LGPD/GDPR)

From legal theory to day-to-day operations: legal bases, data subject rights, incidents and regulator relationships.

AVANÇADO

Incident Response (CSIRT)

How to recognize, contain, eradicate and recover from incidents. Tabletop exercises and tailored playbooks.

INTERMEDIÁRIO

Phishing Simulation and Social Engineering

Real-world simulation campaigns, maturity metrics and an evolution plan based on results.

AVANÇADO

Server and Endpoint Hardening

Practical CIS baselines, GPOs, Intune policies and secure Windows/Linux configurations.

AUDITOR

ISO 27001, Implementation and Internal Auditor

From statement of applicability to the internal audit cycle. Material and exercises aligned to the body of knowledge.

ADMIN

Microsoft 365 and Azure, Administration

Entra ID, Intune, Defender, Purview, Exchange Online, SharePoint and tenant governance for administrators.

INTERMEDIÁRIO

Power BI and Data Analysis

Dimensional modeling, DAX, executive dashboards and an analytical culture for operational teams.

NOVO

Generative AI for Business

Real use cases, risks, usage policy, governance and rollout of enterprise copilots and agents.

AVANÇADO

Vulnerability Management

From scan to patch: risk-based prioritization, EPSS, CVSS, exposure and exploitation windows.

BÁSICO

Consultative Sales in Technology

For commercial and pre-sales teams: discovery, qualification, technical value proposition and long-cycle closing.

Let's talk

Free initial assessment. No commitment, no fluff.

Briefly describe your scenario. Within one business day a specialist will reach out to understand the problem and propose the next step.

Prefer another channel?

contato@rdma.com.br
Centro Empresarial, São Caetano do Sul / SP, Brazil
Business hours: Mon to Fri, 9am to 6pm (BRT)