Protect your business against cyber threats|

Our team of experts has the knowledge and experience to protect your business so you can focus on what you do best.

Find out More

Our Services

Discover our broad range of services available for your business:



Cyber Security Road Map Design

We provide security programs assessments, strategic planning and development of strategic vision road map designed to evolve people, technologies and processes, in challenging business environments.

Experience has dramatically shown that embracing the technology-only approach is not enough for modern cybersecurity threats. Almost every organization has invested on different piece-meal solutions, ranging from antivirus, firewalls, intrusion prevention systems, patch management solutions, anti-malware, data loss preventions systems and so on. However, the modern attacker or malware agent only has to compromise 1 single privileged account in order to gain access to critical systems and information.

Designing an effective cyber-defense is a challenge and it requires the cyber-architect to be able to understand and model the attacker´s mindset and techniques. This is the real value of an effective defense approach that works.

Learn more



Cybersecurity Risk Assessment/Threat Modeling

The modern effective security defense strategy demands that defenders embrace the "Assume Breach" principle. This means that we´d better accept the fact that every organization can be breached, at one time or another and that it should be properly prepared to defend and recover itself from the incident. Thats why we must focus on an effective incident response process and not only rely on passive preventive measures.

It is precisely where designing an effective, tailor-made defense plan and incident response process results critical for success. And a sound Cybersecurity Risk Assessment is the right choice for designing and testing such plans.

Our professional team interacts with customer systems and infrastructure, acting as an attacker would do, identifying the different avenues and vectors in order to gain access to internal systems. This is called Attack Modeling.

Once we have gained the first access, we go beyond, as a real attacker would do. Taking advantage of the initial compromised system, we conduct the lateral movement phase. The idea is to extend the access to different internal systems and at the same time to measure customer's defense capabilities. Typically this phase ends up granting access to major critical systems or even to full organizational compromise.

Our Offensive Security Toolkit includes a set of advanced battery tests that allow us to identify different attack avenues that an adversary could use against the organization and to measure the different risk factors associated with every attack-scenario.

Some of our advanced techniques testing include pass-the-hash, pass-the-ticket, kerberos attacks, privilege escalation on critical systems, database attacks, massive credential theft, etc.

In other words, we are able to proactively identify and measure the current risk to an organization from the attacker's standpoint and to be able to assess and prepare an effective risk-based defense plan for our customers.

Our assessment may include on-site systems, networks, applications, databases, cloud-based systems and some social engineering techniques.

Learn more



Managed Cybersecurity Services

Our managed service helps organizations evolve from a passive cybersecurity posture to an active one, where we adopt the "assume breach" methodology.

We do this by creating a security baseline at the organization and by installing some security traps, sensors and analytics systems that enable our remote team to detect any violations to security posture, identifying the early phases of a possible in-progress attack in order to respond accordingly. This is what we call an "effective threat detection and response system" and demands a sound knowledge of the attacker mindset.

Keeping track of advanced cyber threats in constant growth requires in-depth knowledge, situational awareness, strategic planning, and collaborative work. Let us collaborate with your internal team to enable true security operations processes, maturing your current operations to a level that effectively protects your operations and assets from advanced malware, ransomware attacks, phishing, zero-day attacks, theft problems credentials, and external and internal abuse cases.

Depending on the cybersecurity maturity level of the organization, we can provide different service levels:

  • Vulnerability Management: We can provide this service remotely, identifying vulnerabilities in production systems and leading our customer in the vulnerability life cycle management, up to his attention and mitigation by the asset owner and security team.

  • Cybersecurity Threat Detection: By setting up some remote sensors at customers facilities and leveraging some cloud based technologies, we provide continuos threat detection and rapid response when an attack is detected.

  • Cybersecurity Threat Response: We offer customers the opportunity to enable an effective incident response team capable of dealing with the new category of advanced cyberthreats.

    Acting as first responders and working in collaboration with your internal IT team, we can articulate an effective coordinated response, minimizing the impact of the incident and ensuring a fast recovery.

According to our customers concerns, we can use a combination of technologies such as unsupervised machine-learning systems, traps and lure systems for lateral movement and security analytics to detect abnormal behaviors and advanced attacks in progress.

Learn more



Application Security

One of the greatest risks at organizations are represented by insecure applications, including front end systems, middleware systems and backend databases.

The problem is aggravated if we think about the new clod based security architectures, including AWS, Azure developments or microservices architectures.

Typically, our services comprise two components: source code review of the application and vulnerability assessment of the whole application ecosystem on a UAT or testing environment, including front-end, middleware and database layers.

From those assessments, we identify different security findings representing different risk levels for the organization and make recommendations that should be resolved before releasing the application to production environments.

Learn more

We are DRAGONCY

DragonCY provides cybersecurity services using behavioral modeling to anticipate attacks by processing large amounts of data, identify anomalies behavior and use incident response automation.

Our bold vision is founded in machine learning algorithms and security analytics to prevent, detect and respond to cybersecurity incidents.

Our innovative risk scoring mathematical platform allows us to understand risk metrics and the level of risk exposure of our customers


Marketing Materials:

Services
  • Brochure
Success Stories:
  • The case for Luxury Leisure Hotels
  • Healthcare Medical Center
  • Finance Institution

Let's Get Started!

Get in touch with us so we can start working on protecting your business online.

E-mail Us:

* All fields are required. Once we receive your message we will respond as soon as possible.

Other Ways to Reach Us:

We are easy to find with two locations.

THE UNITED STATES

709 Bryson Way
Southlake, TX 76092

(214)-284-7039


MEXICO

Sabino Rodriguez 12
Col. San Jerónimo Lídice,
Alcaldía La Magdalena Contreras
C.P. 10200, Ciudad de México

(+52) 55 5035 9808