Dependable Global Solutions
Distinction in Security/Excellence in Service

Services

Cybersecurity

 

Protect and Defend

DGS identifies, responds to, and defends against dynamic, complex, multi-vector, multi-threaded attacks aimed at each layer and access point of our clients’ environments.

 
 
Red_Team.jpg

red team

  • Employ simulated adversarial threat-based approaches to expose and exploit CND vulnerabilities
  • Identify weaknesses to improve the security posture and operational procedures used to protect Information Systems & Computer Networks
  • Perform penetration testing missions for customer security requirements to test and validate the effectiveness of customers’ IT security posture
Blue_Team.jpg

Blue team

  • Conduct technical and non-technical Independent Verification & Validation (IV&V) assessment missions
  • Perform various automated and manual testing, examination, scanning, interviewing, and discovery techniques to identify, validate, and assess vulnerabilities
Cyber_Hunt.jpg

cyber hunt

  • Digest open source and classified intelligence sources for inclusion in the development and enhancement of an organization’s security profile
  • Evaluate new and emerging technologies, integrate these technologies into the current security profile, and parse intelligence products for operational application
  • Manage attack sense and warning indicators, and provide continual training of analytical staff
Forensics.jpg

Forensics

  • Capture system images and perform reverse engineering activities
  • Proactively and reactively provide malware analysis capabilities to increase the effectiveness of response, detection, and protection

 

Tools of the Trade

  • Firewalls, both network and host based
  • Network and Host Intrusion Detection/Prevention Systems
  • Vulnerability scanning engines and applications
  • Anti-virus solutions
  • Web Content Filters
  • Access Control Systems
  • Log collection and correlation tools (ArcSight, Splunk)
  • Network packet capture and analysis
 

Proven Best Practices

  • Incident Response
  • Security Operations
  • Security Operations Management
  • Incident Handling and Response
  • Forensic Analysis (e.g. Reverse Engineering Malware, Anomalous Traffic Analysis)
  • Security Engineering
  • Insider Threat Analysis
  • Cyber Risk Management
  • Cyber Vulnerability Management
  • Governance, Risk, and Compliance (GRC)